Sciweavers

981 search results - page 75 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
SC
2009
ACM
15 years 6 months ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
AAAI
2000
15 years 2 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
ICMB
2007
IEEE
134views Business» more  ICMB 2007»
15 years 1 months ago
Applying Location-Aware Linkcell-Based Data Management to Context-Aware Mobile Business Services
Providing location-aware services to mobile users comes with an inherent service-degrading data management problem for which the location-aware linkcell-based data management meth...
James E. Wyse
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 6 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
ECEASST
2008
112views more  ECEASST 2008»
15 years 1 months ago
Flexible Modeling of Emergency Scenarios using Reconfigurable Systems
In emergency scenarios we can obtain a more effective coordination among team members constituting a mobile ad hoc network (MANET) through the use of reconfigurable systems. This ...
Kathrin Hoffmann, Hartmut Ehrig, Julia Padberg