Sciweavers

1361 search results - page 215 / 273
» A Service-Oriented Design Framework for Secure Network Appli...
Sort
View
133
Voted
RTAS
1996
IEEE
15 years 9 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
SACMAT
2003
ACM
15 years 10 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
161
Voted
CCS
2008
ACM
15 years 7 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
GIS
2003
ACM
16 years 6 months ago
Computational data modeling for network-constrained moving objects
Advances in wireless communications, positioning technology, and other hardware technologies combine to enable a range of applications that use a mobile user's geo-spatial da...
Laurynas Speicys, Christian S. Jensen, Augustas Kl...
144
Voted
GLOBECOM
2009
IEEE
16 years 2 days ago
Statistical Modeling of Co-Channel Interference
—With increasing spatial reuse of the radio spectrum, co-channel interference is becoming the dominant noise source and may severely degrade the communication performance of wire...
Kapil Gulati, Aditya Chopra, Brian L. Evans, Keith...