Sciweavers

354 search results - page 43 / 71
» Key management for content access control in a hierarchy
Sort
View
ENTCS
2007
98views more  ENTCS 2007»
14 years 9 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
14 years 7 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
ACSAC
2001
IEEE
15 years 1 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith
COLCOM
2009
IEEE
15 years 1 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...