Sciweavers

299 search results - page 53 / 60
» Managing Access Control for Presence-Based Services
Sort
View
DIM
2005
ACM
15 years 1 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
GLOBECOM
2007
IEEE
15 years 6 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
ICDCS
1999
IEEE
15 years 4 months ago
Beyond the Black Box: Event-based Inter-Process Communication in Process Support Systems
Existing workflow management systems encapsulate the data and behavior of a process within its execution scope, preventing other processes from accessing this information until th...
Claus Hagen, Gustavo Alonso
GEOINFO
2003
15 years 1 months ago
The Architecture of a Mobile Emergency Plan Deployment System
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
Fábio Meira de Oliveira Dias, Marcelo T&iac...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 6 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud