Sciweavers

807 search results - page 99 / 162
» Term Rewriting for Access Control
Sort
View
129
Voted
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 5 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
158
Voted
IJAHUC
2007
135views more  IJAHUC 2007»
15 years 5 months ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
199
Voted
WISE
2010
Springer
15 years 2 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
CDC
2010
IEEE
148views Control Systems» more  CDC 2010»
15 years 23 hour ago
Distributed parameter estimation in networks
In this paper, we present a model of distributed parameter estimation in networks, where agents have access to partially informative measurements over time. Each agent faces a loca...
Kamiar Rahnama Rad, Alireza Tahbaz-Salehi
184
Voted
JSAC
2011
171views more  JSAC 2011»
14 years 7 months ago
QoS Provisioning for Heterogeneous Services in Cooperative Cognitive Radio Networks
—In this paper, we propose a spectrum allocation framework that jointly considers the Quality-of-Service (QoS) provisioning for heterogeneous secondary Real-Time (RT) and Non-Rea...
Ammar Alshamrani, Xuemin (Sherman) Shen, Liang-Lia...