Sciweavers

747 search results - page 78 / 150
» TODS Special Issues
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 6 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
SACMAT
2009
ACM
15 years 6 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
FGR
2008
IEEE
115views Biometrics» more  FGR 2008»
15 years 6 months ago
Meeting behavior detection in smart environments: Nonverbal cues that help to obtain natural interaction
Unobtrusive and multiple-sensor interfaces enable observation of natural human behavior in smart environments. Being able to detect, analyze and interpret this activity allows for...
Mannes Poel, Ronald Poppe, Anton Nijholt
ICPP
2008
IEEE
15 years 6 months ago
A List-Based Strategy for Optimal Replica Placement in Data Grid Systems
—Data replications is a typical strategy for improving access performance and data availability in Data Grid systems. Current works on data replication in Grid systems focus on t...
Yi-Fang Lin, Jan-Jan Wu, Pangfeng Liu