Sciweavers

1478 search results - page 229 / 296
» Modeling user activities in a large IPTV system
Sort
View
IWCMC
2006
ACM
15 years 7 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
ACSAC
1998
IEEE
15 years 5 months ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer
ICFP
2008
ACM
16 years 1 months ago
A functional model-view-controller software architecture for command-oriented programs
Command-oriented functional programs are currently structured in an ad hoc way that makes the development of multiple userinterfaces difficult and error prone, and makes it diffic...
Alley Stoughton
AGENTS
2000
Springer
15 years 6 months ago
MAS Infrastructure: Definitions, Needs and Prospects
This paper attempts to articulate the general role of infrastructure for multi-agent systems (MAS), and why infrastructure is a particularly critical issue if we are to increase th...
Les Gasser
HUC
2010
Springer
15 years 2 months ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...