Sciweavers

14285 search results - page 2778 / 2857
» Web Based Management
Sort
View
SACMAT
2005
ACM
15 years 5 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SENSYS
2005
ACM
15 years 5 months ago
Intelligent light control using sensor networks
Increasing user comfort and reducing operation costs have always been two primary objectives of building operations and control strategies. Current building control strategies are...
Vipul Singhvi, Andreas Krause, Carlos Guestrin, Ja...
WOWMOM
2005
ACM
175views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
DIMSUMNet: New Directions in Wireless Networking Using Coordinated Dynamic Spectrum Access
Recent advances in Software Defined Radio (SDR), wide band spectrum sensing, and environment aware real-time spectrum allocation [13, 10, 4] show promise of enabling the new para...
Milind M. Buddhikot, Paul Kolodzy, Scott Miller, K...
APN
2005
Springer
15 years 5 months ago
Genetic Process Mining
The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
« Prev « First page 2778 / 2857 Last » Next »