Sciweavers

351 search results - page 28 / 71
» Formalisation and implementation of Access control models
Sort
View
COLCOM
2005
IEEE
15 years 6 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
107
Voted
EOR
2006
82views more  EOR 2006»
15 years 14 days ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
112
Voted
EUSAI
2004
Springer
15 years 4 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
JSW
2008
106views more  JSW 2008»
15 years 13 days ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
107
Voted
TCOM
2010
133views more  TCOM 2010»
14 years 11 months ago
Transmission control in cognitive radio as a Markovian dynamic game: Structural result on randomized threshold policies
Abstract——This paper considers an uplink time division multiple access (TDMA) cognitive radio network where multiple cognitive radios (secondary users) attempt to access a spect...
J. Huang, V. Krishnamurthy