Sciweavers

688 search results - page 110 / 138
» A Calculus for Access Control in Distributed Systems
Sort
View
VTC
2006
IEEE
109views Communications» more  VTC 2006»
14 years 3 months ago
Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput
— IEEE 802.11 WLAN has been widely accepted throughout the world. However, it has large overhead due to idle backoff slots and frequent collisions depending on the number of node...
Hojin Lee, Jaeyoung Choi, Taekyoung Kwon, Yanghee ...
DMDW
2000
118views Management» more  DMDW 2000»
13 years 10 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
IJWBC
2008
120views more  IJWBC 2008»
13 years 9 months ago
Internet governance: towards a non-representational democracy
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
Martin Hans Knahl, Geoff Cox
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
13 years 7 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
TLDI
2005
ACM
102views Formal Methods» more  TLDI 2005»
14 years 2 months ago
An open and shut typecase
Two different ways of defining ad-hoc polymorphic operations commonly occur in programming languages. With the first form polymorphic operations are defined inductively on the...
Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie...