Sciweavers

1517 search results - page 161 / 304
» Time and Location Based Services with Access Control
Sort
View
118
Voted
CNIS
2006
15 years 3 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
TPDS
2008
115views more  TPDS 2008»
15 years 1 months ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung
107
Voted
ASPDAC
2007
ACM
144views Hardware» more  ASPDAC 2007»
15 years 5 months ago
Control-Flow Aware Communication and Conflict Analysis of Parallel Processes
In this paper, we present an approach for control-flow aware communication and conflict analysis of systems of parallel communicating processes. This approach allows to determine ...
Axel Siebenborn, Alexander Viehl, Oliver Bringmann...
CSE
2009
IEEE
15 years 8 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
111
Voted
JAIR
2008
121views more  JAIR 2008»
15 years 1 months ago
A Constraint Programming Approach for Solving a Queueing Control Problem
In a facility with front room and back room operations, it is useful to switch workers between the rooms in order to cope with changing customer demand. Assuming stochastic custom...
Daria Terekhov, J. Christopher Beck