Sciweavers

828 search results - page 60 / 166
» Access Control in Location-Based Services
Sort
View
FGCS
2007
172views more  FGCS 2007»
14 years 9 months ago
From access and integration to mining of secure genomic data sets across the Grid
The UK Department of Trade and Industry (DTI) funded BRIDGES project (Biomedical Research Informatics Delivered by Grid Enabled Services) has developed a Grid infrastructure to su...
Richard O. Sinnott
IJAHUC
2007
135views more  IJAHUC 2007»
14 years 9 months ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
ACMSE
2005
ACM
15 years 3 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver
GLOBECOM
2006
IEEE
15 years 3 months ago
Analysis of Unfairness between TCP Uplink and Downlink Flows in Wi-Fi Hot Spots
Abstract— This paper focuses on the unfairness problem between TCP uplink and downlink flows in the 802.11 Wi-Fi hot spots and shows that the service is prone to be unfair. The ...
Eun-Chan Park, Dong-Young Kim, Chong-Ho Choi
ICWN
2003
14 years 11 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha