Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (355)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (58)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 10621 - 10650 of 12808
Full-Text Articles in Physical Sciences and Mathematics
Extending The Network Life Time In Wsn Using Energy Efficient Algorithm, Venkata Sesha Sai Koundinya Goparaju
Extending The Network Life Time In Wsn Using Energy Efficient Algorithm, Venkata Sesha Sai Koundinya Goparaju
Electrical & Computer Engineering Theses & Dissertations
Wireless Sensor networks have many potential applications. These wireless sensor networks necessitate specific design requirements of which energy efficiency is vital. The sensor networks consist of sensor nodes that operate on battery power, and replacement of these batteries is very often a strenuous task, since networks are deployed in areas where the act of replacing the batteries proves impractical.
With the limited available energy of sensor nodes, most of the energy is drained during communication. An energy efficient routing algorithm can prolong the lifetime of the network by gradually depleting the nodes in the network. Many of the routing protocols …
Integrating Preservation Functions Into The Web Server, Joan A. Smith
Integrating Preservation Functions Into The Web Server, Joan A. Smith
Computer Science Theses & Dissertations
Digital preservation of theWorldWideWeb poses unique challenges, different fromthe preservation issues facing professional Digital Libraries. The complete list of a website’s resources cannot be cited with confidence, and the descriptive metadata available for the resources is so minimal that it is sometimes insufficient for a browser to recognize. In short, the Web suffers from a counting problem and a representation problem. Refreshing the bits, migrating from an obsolete file format to a newer format, and other classic digital preservation problems also affect the Web. As digital collections devise solutions to these problems, the Web will also benefit. But the core …
Bag-Of-Visual-Words Expansion Using Visual Relatedness For Video Indexing, Yu-Gang Jiang, Chong-Wah Ngo
Bag-Of-Visual-Words Expansion Using Visual Relatedness For Video Indexing, Yu-Gang Jiang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Bag-of-visual-words (BoW) has been popular for visual classification in recent years. In this paper, we propose a novel BoW expansion method to alleviate the effect of visual word correlation problem. We achieve this by diffusing the weights of visual words in BoW based on visual word relatedness, which is rigorously defined within a visual ontology. The proposed method is tested in video indexing experiment on TRECVID-2006 video retrieval benchmark, and an improvement of 7% over the traditional BoW is reported.
Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim
Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Blog/news search engines are very important channels to reach information about the real-time happenings. In this paper, we study the popular queries collected over one year period and compare their search results returned by a blog search engine (i.e., Technorati) and a news search engine (i.e., Google News). We observed that the numbers of hits returned by the two search engines for the same set of queries were highly correlated, suggesting that blogs often provide commentary to current events reported in news. As many popular queries are related to some events, we further observed a high cohesiveness among the returned …
Congestion Mitigation In Wireless Sensor Networks Using Single-Hop Backpressure Algorithm, Vijay Shekar Mangilipalli Gangu Sham
Congestion Mitigation In Wireless Sensor Networks Using Single-Hop Backpressure Algorithm, Vijay Shekar Mangilipalli Gangu Sham
Electrical & Computer Engineering Theses & Dissertations
Wireless sensor networks consist of a group of small components with limited resources allocated to sense the environment and transmit data to the user or interpreter. This concept is technically evolved from Sensors that are basically used to sense the environment around and collect data based on the sensing application incorporated in them. An extension to functionality of the sensors leads to the concept of sensor networks, where, in addition to gathering information at individual sensors, the data is processed and transmitted to a central station or Base station. This concept of transmitting the information from one node to the …
High-Resolution Optical Imaging For Deep-Water Archaeology, Hanumant Singh, Christopher Roman, Oscar Pizarro, Brendan Foley, Ryan Eustice, Ali Can
High-Resolution Optical Imaging For Deep-Water Archaeology, Hanumant Singh, Christopher Roman, Oscar Pizarro, Brendan Foley, Ryan Eustice, Ali Can
Christopher N. Roman
No abstract provided.
An Analysis Of Botnet Vulnerabilities, Sean W. Hudson
An Analysis Of Botnet Vulnerabilities, Sean W. Hudson
Theses and Dissertations
Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.
Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose
Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose
Professor Aditya K. Ghose
Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …
Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose
Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose
Professor Aditya K. Ghose
Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …
Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu
Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu
Professor Aditya K. Ghose
A key impediment to the widespread adoption of web services is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to varying degrees. In …
Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis
Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis
Professor Aditya K. Ghose
Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially non-compliant, in a manner that accommodates the structural and semantic dimensions of parsimoniously annotated process models. We also provide a heuristic approach to compliance resolution using a notion of compliance patterns. This allows us to partially automate compliance resolution, leading to reduced levels of analyst involvement …
Using Constraint Hierarchies To Support Qos-Guided Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu
Using Constraint Hierarchies To Support Qos-Guided Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu
Professor Aditya K. Ghose
A key impediment to the widespread adoption of web services is the is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors [12]. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to …
Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung
Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung
Professor Aditya K. Ghose
Modeling is an important and time consuming part of the Business Process Management life-cycle. An analyst reviews existing documentation and queries relevant domain experts to construct both mental and concrete models of the domain. To aid this exercise, we propose the Rapid Business Process Discovery (R-BPD) framework and prototype tool that can query heterogeneous information resources (e.g. corporate documentation, web-content, code e.t.c.) and rapidly construct proto-models to be incrementally adjusted to correctness by an analyst. This constitutes a departure from building and constructing models toward just editing them. We believe this rapid mixed-initiative modeling will increase analyst productivity by significant …
Combining Agent-Oriented Conceptual Modelling With Formal Methods, S. A. Vilkomir, Aditya K. Ghose, A. Krishna
Combining Agent-Oriented Conceptual Modelling With Formal Methods, S. A. Vilkomir, Aditya K. Ghose, A. Krishna
Professor Aditya K. Ghose
Agent-oriented conceptual modelling notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. Agent-oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. Formal methods such as those based on the Z notation offer a complementary set of representational facilities. We explore how these two otherwise disparate approaches might be used in a synergistic fashion.
Executable Specifications For Agent Oriented Conceptual Modelling, Y. Guan, Aditya K. Ghose
Executable Specifications For Agent Oriented Conceptual Modelling, Y. Guan, Aditya K. Ghose
Professor Aditya K. Ghose
Agent-oriented conceptual modelling (AoCM) notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. AoCM notations are useful in modeling organizational context and in offering high-level anthropomorphic abstractions as modeling constructs. AoCM notations such as i* help answer questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the 3APL language. In addition, we suggest a hybrid modeling, or co-evolution, approach in which …
Hierarchic Decomposition In Agent Oriented Conceptual Modelling, R. B. Brown, Aditya K. Ghose
Hierarchic Decomposition In Agent Oriented Conceptual Modelling, R. B. Brown, Aditya K. Ghose
Professor Aditya K. Ghose
Software development processes requires a thorough understanding of stakeholder objectives and requirements. Product-centrism is an insufficient stance from which to achieve greater efficiencies and reduce reengineering. Stakeholder requirement elicitation is thus worthy of formalization. A suite of tools, notably the i* model, provides a framework for early-phase requirements capture. These tools currently are at best only semiautomated and essentially consist of a notational glossary and sets of mark-up symbols. Increasing formalization may lead to greater automation of the process in the future, but currently there is a degree of flexibility that presents pitfalls for the unwary practitioner. A notion of …
Co-Evolution Of Agent Oriented Conceptual Models And Use Case Diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya K. Ghose
Co-Evolution Of Agent Oriented Conceptual Models And Use Case Diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya K. Ghose
Professor Aditya K. Ghose
Agent--oriented conceptual modeling notations such as i* represents an interesting approach for modeling early phase requirements which includes organizational contexts, stakeholder intentions and rationale. On the other hand Use Case diagram is used for capturing functional requirements of the system. The integration of i* model and Use Case diagram closes the gap of capturing organizational requirements and system requirements. But in both contexts the requirements might change at any time. Any change made in one model must be reflected in the other. This paper proposes a methodology supporting the co-evolution of these two otherwise disparate approaches in a synergistic fashion.
Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose
Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose
Professor Aditya K. Ghose
Agent-Oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the CASO language. In addition, we suggest a hybrid modelling, or co-evolution, approach in which i* models and CASO agent programs are concurrently maintained and updated, while retaining some modicum of loose consistency between the two. This allows us to benefit from the complementary …
A Combined Approach For Supporting The Business Process Model Lifecycle, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose
A Combined Approach For Supporting The Business Process Model Lifecycle, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose
Professor Aditya K. Ghose
Business processes evolve throughout their lifecycle of change. Business Process Modeling (BPM2) notations such as BPMN are used to effectively conceptualize and communicate important process characteristics to relevant stakeholders. Agent-oriented conceptual modeling notations, such as i*, effectively capture and communicate organizational context. In this paper we argue that the management of change throughout the business process model lifecycle can be more effectively supported by combining notations. In particular, we identify two potential sources of process change, one occurring within the organizational context and the other within the operational context. As such the focus in this paper is on the co-evolution …
Location-Based Hashing For Querying And Searching, Felix Ching
Location-Based Hashing For Querying And Searching, Felix Ching
Computer Science and Computer Engineering Undergraduate Honors Theses
The rapidly growing information technology in modern days demands an efficient searching scheme to search for desired data. Locality Sensitive Hashing (LSH) is a method for searching similar data in a database. LSH achieves high accuracy and precision for locating desired data, but consumes a significant amount of memory and time. Based on LSH, this thesis presents two novel schemes for efficient and accurate data searching: Locality Sensitive Hashing-SmithWaterman (LSH-SmithWaterman) and Secure Min-wise Locality Sensitive Hashing (SMLSH). Both methods dramatically reduce the memory and time consumption and exhibit high accuracy in data searching. Simulation results demonstrate the efficiency of the …
Visualization Of An Approach To Data Clustering, Marisabel Guevara
Visualization Of An Approach To Data Clustering, Marisabel Guevara
Computer Science and Computer Engineering Undergraduate Honors Theses
Using visualization and clustering goals as guidelines, this thesis explores a graphic implementation of a data clustering technique that repositions vertices by applying physical laws of charges and springs to the components of the graph. The resulting visualizations are evidence of the success of the approach as well as of the data sets that lend themselves to a clustering routine. Due to the visual product of the implementation, the algorithm is most useful as an aid in understanding the grouping pattern of a data set. Either for a rapid analysis or to assist in presentation, the visual result of the …
Pitch Correction On The Human Voice, Suzanne Ownbey
Pitch Correction On The Human Voice, Suzanne Ownbey
Computer Science and Computer Engineering Undergraduate Honors Theses
No abstract provided.
Criteria On Utility Designing Of Convex Optimization In Fdma Networks, Zheng Sun, Wenjun Xu, Zhiqiang He, Kai Niu
Criteria On Utility Designing Of Convex Optimization In Fdma Networks, Zheng Sun, Wenjun Xu, Zhiqiang He, Kai Niu
Zheng Sun
In this paper, we investigate the network utility maximization problem in FDMA systems. We summarize with a suite of criteria on designing utility functions so as to achieve the global optimization convex. After proposing the general form of the utility functions, we present examples of commonly used utility function forms that are consistent with the criteria proposed in this paper, which include the well-known proportional fairness function and the sigmoidal-like functions. In the second part of this paper, we use numerical results to demonstrate a case study based on the criteria mentioned above, which deals with the subcarrier scheduling problem …
The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson
The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson
Annual ADFSL Conference on Digital Forensics, Security and Law
The information age provides numerous opportunities for modern society but also presents significant challenges in identifying liability issues and in managing risk. Technological change has occurred rapidly and is continuing at the same time as other major trends and changes are taking place in society and, in particular, in the workplace. The prospect of global liability and the complexity of jurisdictional differences present a considerable hurdle to the uniform regulation of liability issues. General legislation and legal principles have been readily applied to the cyber-world and to modern business practices and the workplace. Where necessary, legislatures have introduced specific legislation …
Data Mining Techniques For Fraud Detection, Rekha Bhowmik
Data Mining Techniques For Fraud Detection, Rekha Bhowmik
Annual ADFSL Conference on Digital Forensics, Security and Law
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.
Keywords: Data Mining, Decision Tree, Bayesian Network, ROC …
Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli
Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper outlines a collaborative project nearing completion between the sec.au Security Research Group at Edith Cowan University and Western Australian Police Computer Crime Squad. The primary goal of this project is to create a software tool for use by non-technical law enforcement officers during the initial investigation and assessment of an electronic crime scene. This tool will be designed as an initial response tool, to quickly and easily find, view and export any relevant files stored on a computer, establishing if further expert investigation of that computer is warranted. When fully developed, the tool will allow investigators unprecedented real …
How Virtualized Environments Affect Computer Forensics, Diane Barrett
How Virtualized Environments Affect Computer Forensics, Diane Barrett
Annual ADFSL Conference on Digital Forensics, Security and Law
Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will describe the …
The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz
The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz
Annual ADFSL Conference on Digital Forensics, Security and Law
Law enforcement is attempting to respond to the growing and complex need to examine all manner of digital evidence using stand-alone forensic workstations and limited storage solutions. Digital forensic investigators often find their cases stalled by cumbersome and inflexible technology limiting their effectiveness. The Virtual Digital Forensics Lab (VDFL) is a new concept that applies existing enterprise host, storage, and network virtualization technologies to current forensic investigative methods. This paper details the concept of the VDFL, the technology solutions it employs, and the flexibility it provides for digital forensic investigators.
Keywords: Virtual Digital Forensics, digital forensic investigations, law enforcement, virtual …
Digital Forensic Certification Versus Forensic Science Certification, Nena Lim
Digital Forensic Certification Versus Forensic Science Certification, Nena Lim
Annual ADFSL Conference on Digital Forensics, Security and Law
Companies often rely on certifications to select appropriate individuals in disciplines such as accounting and engineering. The general public also tends to have confidence in a professional who has some kinds of certification because certification implies a standard of excellence and that the individual has expert knowledge in a specific discipline. An interesting question to the digital forensic community is: How is a digital forensic certification compared to a forensic science certification? The objective of this paper is to compare the requirements of a digital forensic certification to those of a forensic science certification. Results of the comparison shed lights …
Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen
Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen
Faculty of Informatics - Papers (Archive)
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.