Sciweavers

737 search results - page 65 / 148
» Decentralized Utilization Control in Distributed Real-Time S...
Sort
View
WIOPT
2011
IEEE
14 years 6 months ago
Open loop optimal control of base station activation for green networks
Abstract—In recent years there has been an increasing awareness that the deployment as well as utilization of new information technology may have some negative ecological impact....
Sreenath Ramanath, Veeraruna Kavitha, Eitan Altman
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 4 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
SIGCOMM
2009
ACM
15 years 9 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
EEMMAS
2007
Springer
15 years 9 months ago
DECIDE: Applying Multi-agent Design and Decision Logic to a Baggage Handling System
Behind the curtains at check-in desks in airports hide some of the most complex material handling systems, which manage to get your bag transported to the correct departure gate of...
Kasper Hallenborg, Yves Demazeau
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
15 years 8 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter