Sciweavers

1140 search results - page 112 / 228
» A Purpose-Based Access Control Model
Sort
View
CN
2007
80views more  CN 2007»
13 years 8 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
ESWS
2008
Springer
13 years 9 months ago
Entity Lifecycle Management for OKKAM
In this paper, we examine the special requirements of lifecycle management for entities in the context of an entity management system for the semantic web. We study the requirement...
Junaid Ahsenali Chaudhry, Themis Palpanas, Perikli...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 2 months ago
Simulative Analysis of a Multi-Cell Admission Control Algorithm in WCDMA Networks
— It has for long been recognized that in multi-cell wide-band code division multiple access (WCDMA) networks the admission of a new session into the system can have undesirable ...
Gábor Fodor, Gustavo Azzolin
ISQED
2009
IEEE
117views Hardware» more  ISQED 2009»
14 years 2 months ago
Adaptive voltage controlled nanoelectronic addressing for yield, accuracy and resolution
An outstanding challenge for realizing nanoelectronic systems is nano-interface design, i.e., how to precisely access a nanoscale wire in an array for communication between a nano...
Bao Liu
COMPSAC
2001
IEEE
13 years 11 months ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...