Sciweavers

1818 search results - page 263 / 364
» How users use access control
Sort
View
P2P
2003
IEEE
130views Communications» more  P2P 2003»
15 years 9 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...
GECCO
2003
Springer
133views Optimization» more  GECCO 2003»
15 years 9 months ago
Dynamic Strategies in a Real-Time Strategy Game
Abstract. Most modern real-time strategy computer games have a sophisticated but fixed ‘AI’ component that controls the computer’s actions. Once the user has learned how suc...
William Joseph Falke II, Peter Ross
ACSAC
2005
IEEE
15 years 9 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
CHI
2005
ACM
16 years 4 months ago
The power-aware cord: energy awareness through ambient information display
In order to support increased consumer awareness regarding energy consumption, we have been developing new ways of representing and interacting with energy in electric products in...
Anton Gustafsson, Magnus Gyllenswärd
ICSOC
2005
Springer
15 years 9 months ago
Service Oriented Architectures for Science Gateways on Grid Systems
Grid computing is about allocating distributed collections of resources including computers, storage systems, networks and instruments to form a coherent system devoted to a “vir...
Dennis Gannon, Beth Plale, Marcus Christie, Liang ...