Sciweavers

650 search results - page 57 / 130
» Privacy in Non-private Environments
Sort
View
AGENTS
2001
Springer
15 years 1 months ago
Configuration management for multi-agent systems
As heterogeneous distributed systems, multi-agent systems present some challenging con guration management issues. There are the problems of knowing how to allocate agents to comp...
Joseph A. Giampapa, Octavio H. Juarez-Espinosa, Ka...
BCSHCI
2008
14 years 11 months ago
The HCI lab at UNC Charlotte
At the Human Computer Interaction Lab (HCILab) at UNC Charlotte, we investigate novel ways for people to interact with computers, and through computers with their environments. Ou...
Celine Latulipe, Heather Richter Lipford
CSREAPSC
2006
14 years 11 months ago
A Policy-Based Location Identification Architecture for Pervasive Systems
In this paper, we present a policy-based architecture to be used in identifying the location of users within a pervasive system environment. Mobile users can define their own poli...
Sherif G. Aly
ISICT
2003
14 years 11 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
ESORICS
2010
Springer
14 years 10 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock