Sciweavers

2713 search results - page 387 / 543
» Designing Personal Tele-Embodiment
Sort
View
144
Voted
SACMAT
2009
ACM
15 years 11 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
137
Voted
SACMAT
2009
ACM
15 years 11 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
155
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
Router primitives for programmable active measurement
Active probe-based measurements are the foundation for understanding important network path properties such as SLA compliance and available bandwidth. Well-known challenges in act...
Joel Sommers, Paul Barford, Mark Crovella
SIGCOMM
2009
ACM
15 years 11 months ago
Temporal distance metrics for social network analysis
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
SIGCOMM
2009
ACM
15 years 11 months ago
CrossTalk: scalably interconnecting instant messaging networks
We consider the problem of interconnecting a simple type of social network: Instant Messaging services. Today, users are members of various IM communities such as AOL, Yahoo, and ...
Marti A. Motoyama, George Varghese