Once Wireless Local Networks (WLAN) and Bluetooth devices share the same frequency band (ISM) there is a potential risk of interference if they are supposed to operate close to each other. Additionally, the signal fad...
详细信息
Mental health is one of the states of well-being which enables people to cope with various things in everyday life. Despite that, mental health is often overlooked, driving the emergence of numerous mental disorders o...
详细信息
The literature points out some obstacles in teaching the measurement process. Among these, one of the most notorious is the medium as such process is taught, being generally taught purely by means of lectures. In orde...
详细信息
The unified management of user rights and access control policies in a corporation with many units is not easy to implement. Moreover, most of the distributed access control systems are complex and heterogeneous, maki...
详细信息
ISBN:
(纸本)9781605581668
The unified management of user rights and access control policies in a corporation with many units is not easy to implement. Moreover, most of the distributed access control systems are complex and heterogeneous, making it hard to maintain a unified control over all fine grained policies employed by each unit. This paper proposes a unified administration of policies for corporation environments by applying a management scheme based on authorization certificates. These certificates allow the derivation of new fine grained policies in the domain of each unit, assuring that no corporation policies will be violated. These new policies update automatically the corporation repository, preserving the unified management of user rights, and then update the corresponding policy repository of each unit. Our proposal provides a real loosely coupled policy management scheme using a serverless public key infrastructure and the Web Services technology. The prototype shows the proposal viability. Copyright 2009 ACM.
This paper presents an intelligent approach based on software agents capable of conducting and coordination trains in stretches of single railway track, aiming to reduce the utilization of railway and environment impa...
详细信息
Bluetooth is an emerging technology for personal wireless communications and is being applied in many scenarios. In this paper we investigate the data scheduling policy for Bluetooth piconets. In general the performan...
详细信息
From the importance of the portfolio management process has gained by its inclusion in quality models and standards, the amount of organization looking to implement this process effectively and efficiently has increas...
详细信息
Distributed software development is a fact of life for many projects. It is well established that distance makes difficult to interact and to cooperate effectively. Scrum emphasizes communication, reduces coordination...
详细信息
The expansion of deep learning techniques, as well as the availability of large audio/sound datasets, have fueled tremendous breakthroughs in audio/sound classification during the last several years. The transfer lear...
详细信息
Distinguishers have been used in Supervisory Control Theory (SCT) of Discrete Event Systems, as a way to simplify modeling tasks. Approximations complement this approach with an alternative to also reduce synthesis ef...
详细信息
暂无评论