Sciweavers

232 search results - page 3 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
ECTEL
2009
Springer
14 years 25 days ago
LAG 2.0: Refining a Reusable Adaptation Language and Improving on Its Authoring
Reusable adaptation specifications for adaptive behaviour has come to the forefront of adaptive research recently, with EU projects such as GRAPPLE1, and PhD research efforts on de...
Alexandra I. Cristea, David Smits, Jon Bevan, Maur...
MSS
2007
IEEE
76views Hardware» more  MSS 2007»
14 years 16 days ago
Implementing and Evaluating Security Controls for an Object-Based Storage System
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...
MOBICOM
2006
ACM
14 years 6 days ago
Optimal CWmin selection for achieving proportional fairness in multi-rate 802.11e WLANs: test-bed implementation and evaluation
We investigate the optimal selection of minimum contention window values to achieve proportional fairness in a multirate IEEE 802.11e test-bed. Unlike other approaches, the propos...
Vasilios A. Siris, George Stamatakis
HPDC
2007
IEEE
14 years 18 days ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
WWW
2004
ACM
14 years 7 months ago
Flexibility of Automatic Authoring for the Semantic Web
The LAOS model, a 5-layer adaptive hypermedia (AH) authoring model, was previously shown to specify a flexible framework for (collaborative) creation of material for the semantic ...
Alexandra I. Cristea