Sciweavers

1748 search results - page 205 / 350
» Security Models for Heterogeneous Networking
Sort
View
JMM2
2008
107views more  JMM2 2008»
15 years 3 months ago
Dynamic Generation of SMIL-Based Multimedia Interfaces
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
José Manuel Oliveira, Eurico Carrapatoso
QUESTA
2010
131views more  QUESTA 2010»
15 years 2 months ago
Asymptotically optimal parallel resource assignment with interference
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Maaike Verloop, R. Núñez Queija
129
Voted
ISI
2007
Springer
15 years 10 months ago
Organizing Hot-Spot Police Patrol Routes
—We address the problem of planning patrol routes to maximize coverage of important locations (hot spots) at minimum cost (length of patrol route). We model a road network using ...
Sudarshan S. Chawathe
COMPSAC
2006
IEEE
15 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
140
Voted
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
15 years 5 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung