Sciweavers

1323 search results - page 152 / 265
» Extended Modeling Languages for Interaction Protocol Design
Sort
View
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 7 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
CIA
2003
Springer
15 years 9 months ago
Send Fredo off to Do This, Send Fredo off to Do That
Abstract. Fredo is a generic domain-independent broker that creates valueadded information taking into account the preferences specified by its clients. Fredo uses ontology service...
Luís Miguel Botelho, Hugo Mendes, Pedro Fig...
MODELS
2007
Springer
15 years 10 months ago
ModHel'X: A Component-Oriented Approach to Multi-Formalism Modeling
Abstract. We present ModHel’X, an approach to multi-formalism modeling which addresses two important issues in this field: (a) providing support for the specification of the se...
Cécile Hardebolle, Frédéric B...
INFOCOM
2006
IEEE
15 years 10 months ago
Cross-Layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks
Abstract— This paper considers jointly optimal design of crosslayer congestion control, routing and scheduling for ad hoc wireless networks. We first formulate the rate constrai...
Lijun Chen, Steven H. Low, Mung Chiang, John C. Do...
DSS
2006
140views more  DSS 2006»
15 years 4 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...