Sciweavers

196 search results - page 17 / 40
» A Hacking View of Access Control
Sort
View
ICC
2007
IEEE
288views Communications» more  ICC 2007»
15 years 9 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang
WWW
2006
ACM
16 years 3 months ago
Cat and mouse: content delivery tradeoffs in web access
Web pages include extraneous material that may be viewed as undesirable by a user. Increasingly many Web sites also require users to register to access either all or portions of t...
Balachander Krishnamurthy, Craig E. Wills
MOBISYS
2007
ACM
16 years 2 months ago
Improving mobile database access over wide-area networks without degrading consistency
We report on the design, implementation, and evaluation of a system called Cedar that enables mobile database access with good performance over low-bandwidth networks. This is acc...
Niraj Tolia, Mahadev Satyanarayanan, Adam Wolbach
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
16 years 4 months ago
Auditing SQL Queries
We study the problem of auditing a batch of SQL queries: Given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this ...
Rajeev Motwani, Shubha U. Nabar, Dilys Thomas
MTA
2011
220views Hardware» more  MTA 2011»
14 years 9 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox