We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Memory system bottlenecks limit performance for many applications, and computations with strided access patterns are among the hardest hit. The streams used in such applications h...
— A novel smart antenna is described, which is conceived as a low complexity inexpensive upgrade for IEEE 802.11b/g Wireless Local Area Network (WLAN) systems. Using smart antenn...
Timothy J. Harrold, Dean C. Kemp, Mark A. Beach, C...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...