Sciweavers

646 search results - page 103 / 130
» Knowledge Management System Design using Extended Gaia
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
90
Voted
MOBICOM
2010
ACM
14 years 10 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
ANLP
1997
110views more  ANLP 1997»
14 years 11 months ago
Automating NL Appointment Scheduling with COSMA
Appointment scheduling is a problem faced daily by many individuals and organizations. Cooperating agent systems have been developed to partially automate this task. In order to e...
Stephan Busemann
CISS
2007
IEEE
15 years 2 months ago
How Many Users should be Turned On in a Multi-Antenna Broadcast Channel
This paper considers broadcast channels with L antennas at the base station and m single-antenna users, where each user has perfect channel knowledge and the base station obtains c...
Wei Dai, Youjian Liu, Brian Rider
118
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 4 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar