Sciweavers

2009 search results - page 296 / 402
» A privacy-aware access control system
Sort
View
IJWBC
2008
120views more  IJWBC 2008»
13 years 10 months ago
Internet governance: towards a non-representational democracy
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
Martin Hans Knahl, Geoff Cox
JCM
2006
86views more  JCM 2006»
13 years 10 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
VTC
2010
IEEE
242views Communications» more  VTC 2010»
13 years 8 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
CIDR
2011
221views Algorithms» more  CIDR 2011»
13 years 1 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 12 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi