Sciweavers

1446 search results - page 71 / 290
» Network Access Control (NAC)
Sort
View
MOBISYS
2003
ACM
15 years 9 months ago
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications
Due to node mobility and limitations on bandwidth availability in wireless channels, there exist unique challenges towards achieving efficient and effective information access in ...
Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou
AINA
2007
IEEE
14 years 11 months ago
Phygital Map: Accessing Digital Multimedia from Physical Map
— We present an augmented map interface called Phygital (physical, digital) Map that enables users to access digital multimedia stored in various off-the-shelf devices from physi...
Jin Nakazawa, Hideyuki Tokuda
HPDC
2000
IEEE
15 years 2 months ago
Managing Network Resources in Condor
Data-intensive applications in the Condor High Throughput Computing environment can place heavy demands on network resources for checkpointing and remote data access. We have deve...
Jim Basney, Miron Livny
AICT
2005
IEEE
117views Communications» more  AICT 2005»
15 years 3 months ago
Managing Pi-resources in 4G Wireless Systems: The Opportunistic Way
Integration of different radio access networks will become a reality in a near future. Our interworking architecture assumes a ubiquitous primary network (the cellular one) and se...
Pedro Sobral, Luis Bernardo, Paulo Pinto
SACMAT
2005
ACM
15 years 3 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...