Sciweavers

602 search results - page 34 / 121
» An access control model for mobile physical objects
Sort
View
CSREASAM
2008
15 years 3 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
SSDBM
2006
IEEE
140views Database» more  SSDBM 2006»
15 years 7 months ago
A Dynamic Mobility Histogram Construction Method Based on Markov Chains
With the recent progress of spatial information technologies and communication technologies, it has become easier to track positions of a large number of moving objects in real-ti...
Yoshiharu Ishikawa, Yoji Machida, Hiroyuki Kitagaw...
143
Voted
ICCD
2007
IEEE
195views Hardware» more  ICCD 2007»
15 years 5 months ago
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation
The emerging trend of larger number of cores or processors on a single chip in the server, desktop, and mobile notebook platforms necessarily demands larger amount of on-chip last...
Jugash Chandarlapati, Mainak Chaudhuri
MMB
2001
Springer
141views Communications» more  MMB 2001»
15 years 6 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
111
Voted
CCS
2000
ACM
15 years 6 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan