Sciweavers

327 search results - page 15 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
CCS
2007
ACM
14 years 3 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
INFOCOM
2003
IEEE
14 years 2 months ago
Exploiting Multiuser Diversity for Medium Access Control in Wireless Networks
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
Xiangping Qin, Randall A. Berry
ICC
2007
IEEE
145views Communications» more  ICC 2007»
14 years 3 months ago
Half Direct-Link Setup (H-DLS) for Fairness between External and Local TCP Connections in IEEE 802.11e Wireless LANs
— The IEEE 802.11e standard supports a Direct-Link Setup (DLS) mechanism optionally to improve the throughput. Using this mechanism, IEEE 802.11e stations in proximity can direct...
Nakjung Choi, Yongho Seok, Yanghee Choi, Taekyoung...
EDCC
1994
Springer
14 years 1 months ago
Hierarchical Checking of Multiprocessors Using Watchdog Processors
A new control flow checking scheme, based on assigned-signature checking by a watchdog processor, is presented. This scheme is suitable for a multitasking, multiprocessor environme...
István Majzik, András Pataricza, Mar...
CODASPY
2011
13 years 18 days ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong