In this paper we describe JClarens; a Java based implementation of the Clarens remote data server. JClarens provides web services for an interactive analysis environment to dynami...
Arshad Ali, Ashiq Anjum, Tahir Azim, Michael Thoma...
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
In this paper, we present two new run-time algorithms for the parallelization of loops that have indirect access patterns. The algorithms can handle any type of loop-carried depen...
Abstract— This paper considers two issues arising in an integrated IEEE 802.16e/802.11 network: 1) finding a possible network, which mobile station (MSTA) can switch to, and 2) ...