Sciweavers

209 search results - page 13 / 42
» Exploiting Information Relationships for Access Control
Sort
View
WOWMOM
2006
ACM
130views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Power Control in Multihop CSMA
—This paper aims at improving the power efficiency of the CSMA/CA protocol for transmission of multimedia information over multihop wireless channels. Using a distance dependent ...
Bo Yan, Hamid Gharavi
PERCOM
2006
ACM
15 years 9 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
15 years 3 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh
IPPS
1996
IEEE
15 years 1 months ago
A Memory Controller for Improved Performance of Streamed Computations on Symmetric Multiprocessors
The growing disparity between processor and memory speeds has caused memory bandwidth to become the performance bottleneck for many applications. In particular, this performance g...
Sally A. McKee, William A. Wulf
EDOC
2005
IEEE
15 years 3 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List