Sciweavers

704 search results - page 84 / 141
» Resource Access Control for an Internet User Agent
Sort
View
ENTCS
2008
130views more  ENTCS 2008»
14 years 10 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
CN
2006
111views more  CN 2006»
14 years 10 months ago
Analytical modeling of CAC in next generation wireless systems
Though Connection Admission Control (CAC) in wireless networks has been studied extensively, the heterogeneous structure of Next Generation Wireless Systems (NGWS) makes CAC very ...
Tuna Tugcu, H. Birkan Yilmaz, Feodor S. Vainstein
SAINT
2006
IEEE
15 years 4 months ago
Language Grid: An Infrastructure for Intercultural Collaboration
To increase the accessibility and usability of online language services, this paper proposes the language grid to create composite language services for various communities. The l...
Toru Ishida
DAIS
2009
14 years 11 months ago
Dependency Management in Smart Homes
In future smart homes functionality will be provided to the inhabitants by software services decoupled from the underlying hardware devices. While this will enhance flexibility and...
Daniel Retkowitz, Sven Kulle
RULEML
2004
Springer
15 years 3 months ago
R-DEVICE: A Deductive RDF Rule Language
In this paper we present R-DEVICE, a deductive rule language for reasoning about RDF metadata. R-DEVICE includes features such as normal and generalized path expressions, stratifie...
Nick Bassiliades, Ioannis P. Vlahavas