Sciweavers

230 search results - page 25 / 46
» Exploring reactive access control
Sort
View
154
Voted
VLSID
2007
IEEE
231views VLSI» more  VLSID 2007»
16 years 28 days ago
AHIR: A Hardware Intermediate Representation for Hardware Generation from High-level Programs
We present AHIR, an intermediate representation (IR), that acts as a transition layer between software compilation and hardware synthesis. Such a transition layer is intended to t...
Sameer D. Sahasrabuddhe, Hakim Raja, Kavi Arya, Ma...
90
Voted
P2P
2003
IEEE
130views Communications» more  P2P 2003»
15 years 5 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...
MTA
2008
186views more  MTA 2008»
15 years 15 days ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl
97
Voted
PET
2009
Springer
15 years 7 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
100
Voted
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 16 days ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang