Sciweavers

85 search results - page 5 / 17
» Organic computing: on the feasibility of controlled emergenc...
Sort
View
WETICE
1997
IEEE
15 years 3 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
WIMOB
2008
IEEE
15 years 6 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
CIBCB
2007
IEEE
15 years 3 months ago
Genetic Regulatory Network Modeling Using Network Component Analysis and Fuzzy Clustering
Gene regulatory network model is the most widely used mechanism to model and predict the behavior of living organisms. Network Component Analysis (NCA) as an emerging issue for unc...
Fatemeh Bakouie, Mohammad Hassan Moradi
P2P
2007
IEEE
110views Communications» more  P2P 2007»
15 years 6 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
PERCOM
2006
ACM
15 years 11 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste