Sciweavers

1927 search results - page 289 / 386
» An Access Control Model for Location based Services
Sort
View
ICWE
2003
Springer
15 years 6 months ago
X-SHAAD: An XML Implementation for Hypermedia Systems Modeling through SHAAD
Abstract. In this paper we present an implementation using XML and Java (XSHAAD) based on a modular architecture of SHAAD to support a web-based Adaptive Hypermedia System. This ar...
David Mérida, Ramón Fabregat, Carlos...
MODELLIERUNG
2008
15 years 3 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
PADS
2006
ACM
15 years 7 months ago
Intelligent Management of Data Driven Simulations to Support Model Building
Artificial intelligence (AI) can contribute to the management of a data driven simulation system, in particular with regard to adaptive selection of data and refinement of the mo...
Catriona Kennedy, Georgios K. Theodoropoulos
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 7 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 7 months ago
Downlink TCP Performance Under Cross Layer Rate and Power Allocation in Infrastructure TH-PPM UWB Networks
Ultra wideband (UWB) systems are currently an important wireless infrastructure for efficient shortrange communications. To improve the system efficiency while guaranteeing the ra...
Yang Liu, Yu-Kwong Kwok, Jiangzhou Wang