Sciweavers

1140 search results - page 60 / 228
» A Purpose-Based Access Control Model
Sort
View
111
Voted
INFOCOM
1997
IEEE
15 years 7 months ago
Investigation of the IEEE 802.11 Medium Access Control (MAC)
Analysis of the drafi IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard’s ad hoc and infrastructure netw...
Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Pres...
112
Voted
FLAIRS
2001
15 years 4 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
132
Voted
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 4 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
136
Voted
RTS
2006
115views more  RTS 2006»
15 years 2 months ago
Resource access control for dynamic priority distributed real-time systems
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Chen Zhang, David Cordes
145
Voted
SECON
2010
IEEE
15 years 19 days ago
Multiple Access Mechanisms with Performance Guarantees for Ad-Hoc Networks
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each ac...
Paola Bermolen, François Baccelli