Sciweavers

1927 search results - page 328 / 386
» An Access Control Model for Location based Services
Sort
View
CNIS
2006
14 years 11 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
ACSAC
2006
IEEE
15 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
IUI
2004
ACM
15 years 3 months ago
SUPPLE: automatically generating user interfaces
In order to give people ubiquitous access to software applications, device controllers, and Internet services, it will be necessary to automatically adapt user interfaces to the c...
Krzysztof Gajos, Daniel S. Weld
DSOM
2004
Springer
15 years 3 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
GLOBECOM
2008
IEEE
15 years 4 months ago
A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks
—The cognitive radio based IEEE 802.22 wireless regional area network (WRAN) is designed to operate in the under–utilized TV bands by detecting and avoiding primary TV transmis...
Shamik Sengupta, R. Chandramouli, Swastik Brahma, ...