Sciweavers

132 search results - page 12 / 27
» A method for access authorisation through delegation network...
Sort
View
SACMAT
2005
ACM
14 years 1 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
WCNC
2008
IEEE
14 years 1 months ago
Adaptive Tuning of MIMO-Enabled 802.11e WLANs with Network Utility Maximization
— The IEEE 802.11-based wireless local area networks (WLANs) are widely used for high-speed wireless data access. With the recent 802.11e quality-of-service (QoS) extension, real...
Yuxia Lin, Vincent W. S. Wong
ICN
2001
Springer
13 years 12 months ago
Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets
Abstract— Network service providers contract with network owners for connection rights, then offer individual users network access at a price. Within this hierarchy, the service ...
Errin W. Fulp, Douglas S. Reeves
PDSE
2000
96views more  PDSE 2000»
13 years 8 months ago
Applying Distributed Object Technology to Network Planning
The aim of this paper is to describe a generic interface through which a planning tool or design aid can be connected to a telecommunications network. In today's complex and ...
Tertius D. Wessels, Judy M. Bishop
BIOADIT
2004
Springer
14 years 28 days ago
Media Streaming on P2P Networks with Bio-inspired Cache Replacement Algorithm
With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata, ...