Sciweavers

5348 search results - page 943 / 1070
» Time-critical information services
Sort
View
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
15 years 5 months ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 5 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
RFID meets bluetooth in a semantic based u-commerce environment
We present a novel resource discovery framework for u-commerce. Both the original RFID data exchange protocol and the Bluetooth Service Discovery Protocol have been extended in or...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...
ATAL
2007
Springer
15 years 5 months ago
Towards reflective mobile agents for resource-constrained mobile devices
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 5 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge