Sciweavers

1927 search results - page 354 / 386
» An Access Control Model for Location based Services
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
WCRE
2000
IEEE
15 years 2 months ago
Towards Portable Source Code Representations using XML
One of the most important issue in source code analysis and software re-engineering is the representation of ode text at an abstraction level and form suitable for algorithmic pro...
Evan Mamas, Kostas Kontogiannis
BCSHCI
2009
14 years 11 months ago
Using technologies to support reminiscence
This paper is about the evolution of a system prototype called Pensieve whose goal is to support people's reminiscing practices. A number of technologies exist to manage memo...
Dan Cosley, Kathy Akey, Brian Alson, Jonathan Baxt...
92
Voted
CNSM
2010
14 years 7 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
15 years 2 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....