Supply chain decisions are improved with access to global information. However, supply chain partners are frequently hesitant to provide full access to all the information within ...
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Due to the scarcity of the spectral resources and mobility of the portables, the call attempts may be blocked during call initiation or terminated during the hand-off process. Whe...
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...