Sciweavers

883 search results - page 123 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
132
Voted
MOBIHOC
2006
ACM
16 years 5 days ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
15 years 4 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
106
Voted
ISADS
1999
IEEE
15 years 4 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
123
Voted
FLAIRS
2004
15 years 2 months ago
A Functional and Behavioral Knowledge-based Implementation for Intelligent Sensors/Actuators
As the complexity of industrial processes increases, it requires the use of intelligent sensors or actuators (known as Intelligent Instruments) to allow for more comprehensive and...
Richard Dapoigny, Patrick Barlatier, Laurent Foull...
116
Voted
ICPPW
2003
IEEE
15 years 5 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao