Sciweavers

3712 search results - page 438 / 743
» Role-Based Access Control
Sort
View
SAINT
2007
IEEE
15 years 11 months ago
A Generic API for Retrieving Human-Oriented Information from Social Network Services
A unique type of Web service, called a Social Network Service (SNS), first appeared in 2003. Some researches suggested a method to extract meaningful information from SNSs. Such ...
Teruaki Yokoyama, Shigeru Kashihara, Takeshi Okuda...
VTC
2007
IEEE
158views Communications» more  VTC 2007»
15 years 11 months ago
Efficient Spatial Reuse in Multi-Radio, Multi-Hop Wireless Mesh Networks
— In the paper, we propose a novel scheduling mechanism without modifying the existing IEEE 802.11 MAC, called wireless Radio-Matching Protocol (RMP). It takes account of interfe...
Da-Ren Guo, Kuochen Wang, Lung-Sheng Lee
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 11 months ago
Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks
Abstract— Wireless ad hoc networks provide a useful communications infrastructure for the mobile battlefield. In this paper we apply and develop passive radio frequency signal s...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...
NBIS
2007
Springer
15 years 11 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
UCS
2007
Springer
15 years 11 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti