Sciweavers

981 search results - page 96 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
JAIHC
2010
147views more  JAIHC 2010»
15 years 18 hour ago
Agents and ambient intelligence: case studies
The significance that ambient intelligence (AmI) has acquired in recent years requires the development of innovative solutions. In this sense, the development of AmI-based systems...
Dante I. Tapia, Ajith Abraham, Juan M. Corchado, R...
GCC
2004
Springer
15 years 7 months ago
Image-Based Walkthrough over Internet on Mobile Devices
Real-time rendering of complex 3D scene on mobile devices is a challenging task. The main reason is that mobile devices have limited computational capabilities and are lack of powe...
Yu Lei, Zhongding Jiang, Deren Chen, Hujun Bao
VLDB
2005
ACM
177views Database» more  VLDB 2005»
16 years 1 months ago
Indexing mobile objects using dual transformations
With the recent advances in wireless networks, embedded systems and GPS technology, databases that manage the location of moving objects have received increased interest. In this ...
George Kollios, Dimitris Papadopoulos, Dimitrios G...
RBAC
1997
135views more  RBAC 1997»
15 years 2 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
COLCOM
2007
IEEE
15 years 5 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...