Sciweavers

8080 search results - page 279 / 1616
» From Computer Networks to Agent Networks
Sort
View
AINA
2007
IEEE
15 years 10 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
122
Voted
ISMVL
2000
IEEE
105views Hardware» more  ISMVL 2000»
15 years 8 months ago
Computational Neurobiology Meets Semiconductor Engineering
Many believe that the most important result to come out of the last ten years of neural network research is the significant change in perspective in the neuroscience community tow...
Dan W. Hammerstrom
SENSYS
2003
ACM
15 years 9 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
MWCN
2004
Springer
15 years 9 months ago
Context-Aware Inter-Networking for Wireless Networks
Abstract Key issues of wireless ad hoc networks are auto-configuration and flexibility. Due to mobility, wireless networks are subject to frequent splits and merges. In many situ...
Franck Legendre, Marcelo Dias de Amorim, Serge Fdi...
PERCOM
2009
ACM
16 years 4 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu