Sciweavers

423 search results - page 77 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
OTM
2007
Springer
14 years 2 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
LCN
2006
IEEE
14 years 2 months ago
Bandwidth Aware Slot Allocation in Hybrid MAC
— Hybrid Medium Access Control (MAC) protocols combine the strength of random and schedule based MAC schemes. From random MAC schemes, Hybrid MAC protocols borrow flexibility an...
Yuvraj. K. Rana, Bao Hua Liu, Alfandika Nyandoro, ...
ICMCS
2005
IEEE
183views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Bandwidth Estimation and Robust Video Streaming Over 802.11E Wireless Lans
Streaming high quality audio/video (AV) from home media sources to TV sets over a wireless local area network (WLAN) is a challenging problem because of the fluctuating bandwidth...
Mehmet Umut Demircin, Peter van Beek
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 2 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
CN
2008
95views more  CN 2008»
13 years 8 months ago
Enabling open-source cognitively-controlled collaboration among software-defined radio nodes
Software-defined radios (SDRs) are now recognized as a key building block for future wireless communications. We have spent the past year enhancing existing open software to creat...
Gregory Troxel, Eric Blossom, Steve Boswell, Arman...