Sciweavers

2497 search results - page 396 / 500
» Requirements for models of achievable routing
Sort
View
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 3 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
FLAIRS
2004
15 years 3 months ago
A Functional and Behavioral Knowledge-based Implementation for Intelligent Sensors/Actuators
As the complexity of industrial processes increases, it requires the use of intelligent sensors or actuators (known as Intelligent Instruments) to allow for more comprehensive and...
Richard Dapoigny, Patrick Barlatier, Laurent Foull...
TNC
2004
103views Education» more  TNC 2004»
15 years 3 months ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen
108
Voted
GLOBECOM
2008
IEEE
15 years 1 months ago
Network Planning for Next-Generation Metropolitan-Area Broadband Access under EPON-WiMAX Integration
Abstract--This paper tackles a fundamental problem of network planning and dimensioning under EPON-WiMAX integration for next-generation wireless metropolitan-area broadband access...
Bin Lin, Pin-Han Ho, Xuemin Shen, Frank Chih-Wei S...
CCR
2010
131views more  CCR 2010»
15 years 1 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...