Sciweavers

581 search results - page 85 / 117
» policy 2009
Sort
View
ICISS
2009
Springer
14 years 7 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
ICDE
2009
IEEE
198views Database» more  ICDE 2009»
15 years 11 months ago
Double Index NEsted-Loop Reactive Join for Result Rate Optimization
Adaptive join algorithms have recently attracted a lot of attention in emerging applications where data is provided by autonomous data sources through heterogeneous network enviro...
Mihaela A. Bornea, Vasilis Vassalos, Yannis Kotidi...
WWW
2009
ACM
15 years 10 months ago
User-centric content freshness metrics for search engines
In order to return relevant search results, a search engine must keep its local repository synchronized to the Web, but it is usually impossible to attain perfect freshness. Hence...
Ali Dasdan, Xinh Huynh
ICFP
2009
ACM
15 years 10 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
ECOOP
2009
Springer
15 years 10 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...