Sciweavers

1140 search results - page 110 / 228
» A Purpose-Based Access Control Model
Sort
View
WICON
2008
13 years 9 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
MASCOTS
2010
13 years 6 months ago
Performance of Quantized Congestion Notification in TCP Incast Scenarios of Data Centers
This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers...
Prajjwal Devkota, A. L. Narasimha Reddy
OWLED
2008
13 years 9 months ago
Managing Change: An Ontology Version Control System
In this paper we present the basic requirements and initial design of a system which manages and facilitates changes to an OWL ontology in a multi-editor environment. This system u...
Timothy Redmond, Michael Smith, Nick Drummond, Tan...
MSWIM
2005
ACM
14 years 1 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø
WSC
1998
13 years 9 months ago
Parallel Simulation for Aviation Applications
The Detailed Policy Assessment Tool (DPAT) is a widely used simulation of air traffic control that incorporates advanced technology for user-friendly operation. DPAT computes cong...
Frederick Wieland