Sciweavers

1818 search results - page 172 / 364
» How users use access control
Sort
View
TPDS
2002
127views more  TPDS 2002»
15 years 4 months ago
Adaptive Bandwidth Reservation and Admission Control in QoS-Sensitive Cellular Networks
How to keep the probability of hand-off drops within a prespecified limit is a very important Quality-of-Service (QoS) issue in cellular networks because mobile users should be abl...
Sunghyun Choi, Kang G. Shin
HUC
2003
Springer
15 years 10 months ago
Activity Zones for Context-Aware Computing
Location is a primary cue in many context-aware computing systems, and is often represented as a global coordinate, room number, or a set of Euclidean distances to various landmark...
Kimberle Koile, Konrad Tollmar, David Demirdjian, ...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 11 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
CSE
2009
IEEE
15 years 11 months ago
A Framework to Balance Privacy and Data Usability Using Data Degradation
—Personal data is a valuable asset for service providers. To collect such data, free services are offered to users, for whom the risk of loosing privacy by subscribing to a servi...
Harold van Heerde, Maarten M. Fokkinga, Nicolas An...
114
Voted
NDSS
2006
IEEE
15 years 11 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...