Sciweavers

1363 search results - page 172 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
CHI
2009
ACM
15 years 6 months ago
"Pimp My Roomba": designing for personalization
We present a study of how householders personalize their domestic vacuuming robot, iRobot’s Roomba™. In particular, we build on Blom and Monk’s [3] theory of personalization...
Ja-Young Sung, Rebecca E. Grinter, Henrik I. Chris...
CHI
2009
ACM
15 years 6 months ago
Movable cameras enhance social telepresence in media spaces
Media space is a promising but still immature technology to connect distributed sites. We developed a simple additional function that moved a remote camera forward when a local us...
Hideyuki Nakanishi, Yuki Murakami, Kei Kato
CLUSTER
2009
IEEE
15 years 6 months ago
Oblivious routing schemes in extended generalized Fat Tree networks
—A family of oblivious routing schemes for Fat Trees and their slimmed versions is presented in this work. First, two popular oblivious routing algorithms, which we refer to as S...
Germán Rodríguez, Cyriel Minkenberg,...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 5 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
SACMAT
2009
ACM
15 years 5 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...