Sciweavers

468 search results - page 86 / 94
» A compositional framework for access control policies enforc...
Sort
View
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 1 months ago
A Game Theoretic Solution for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
— In multiuser systems, multiuser diversity gains can be achieved by assigning channels to users with higher channel quality. To avoid the extensive information exchange required...
Cristina Comaniciu, Dandan Wang, Hlaing Minn, Naof...
TWC
2008
111views more  TWC 2008»
13 years 7 months ago
A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
Abstract-- Multiuser diversity gains can be achieved by assigning channels to users with better channel quality in multiuser systems. To avoid the extensive information exchange re...
Dandan Wang, Cristina Comaniciu, Hlaing Minn, Naof...
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 11 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
RTSS
2009
IEEE
14 years 2 months ago
Multiprocessor Extensions to Real-Time Calculus
Abstract—Many embedded platforms consist of a heterogeneous collection of processing elements, memory modules, and communication subsystems. These components often implement diff...
Hennadiy Leontyev, Samarjit Chakraborty, James H. ...
SWS
2004
ACM
14 years 23 days ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang