Search
Now showing items 21-30 of 51
Compliance checking for usage-constrained credentials in trust negotiation systems
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
Understanding Simple Stories through Concepts Extraction and Multimedia Elements
(
Springer
, 2012 , Conference Paper)
Teaching children with intellectual disabilities is a challenging task. Instructors use different methodologies and techniques to introduce the concepts of lessons to the children, motivate them and keep them engaged. These ...
Learning games for children with intellectual challenges
(
IEEE
, 2012 , Conference Paper)
This paper discuss the design of the current educational tutorials and games which are developed for children with intellectual challenges who are resident in the Shafallah center for children with special needs in Doha, ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software
(
IEEE
, 2012 , Conference Paper)
The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks ...
Forced spectrum access termination probability analysis under restricted channel handoff
(2012 , Conference Paper)
Most existing works on cognitive radio networks assume that cognitive (or secondary) users are capable of switching/jumping to any available channel, regardless of the frequency gap between the target and the current ...
Discovering influential users in micro-blog marketing with influence maximization mechanism
(2012 , Conference Paper)
Micro-blog marketing has become a main business model for social networks nowadays. On social networking sites (e.g., Twitter), micro-blog marketing enables the advertisers to put ads to attract customers to buy their ...
An autonomic detection and protection system for denial of service attack
(
ACTA Press
, 2012 , Conference Paper)
This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...
Cognitive transmission based on data priority classification in WSNs for Smart Grid
(2012 , Conference Paper)
Smart Grid integrates digital processing, sensor technology, automatic control and communication to the traditional power grid to achieve more efficient electricity distribution and management. Applying wireless sensor ...
All-to-all throughput maximization in wireless relay networks with multiple packet reception
(2012 , Conference Paper)
Network Coding (NC) has shown the promise of significant throughput improvement to wireless networks. Meanwhile, Multiple Packet Reception (MPR) has been proved as an efficient way to combat the Multiple Access Interference ...