Sciweavers

327 search results - page 35 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
WWIC
2005
Springer
137views Communications» more  WWIC 2005»
14 years 3 months ago
Providing Delay Guarantees and Power Saving in IEEE 802.11e Network
Recently, the 802.11e Working Group (WG) has proposed the Hybrid Coordination Function (HCF), which has a HCF Controlled Channel Access (HCCA) and an Enhanced Distributed Coordinat...
Gennaro Boggia, Pietro Camarda, F. A. Favia, Luigi...
AINA
2009
IEEE
14 years 5 months ago
VirtCloud: Virtualising Network for Grid Environments
Networking infrastructure is a vital part of virtual computer clusters. This paper describes VirtCloud, a system for interconnecting virtual clusters in a state-wide network based...
David Antos, Ludek Matyska, Petr Holub, Jirí...
ACMSE
2006
ACM
14 years 4 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
GRID
2007
Springer
14 years 4 months ago
Eliciting honest value information in a batch-queue environment
Abstract— Markets and auctions have been proposed as mechanisms for efficiently and fairly allocating resources in a number of different computational settings. Economic approac...
Andrew Mutz, Richard Wolski, John Brevik
EMSOFT
2001
Springer
14 years 2 months ago
Some Synchronization Issues When Designing Embedded Systems from Components
Abstract This paper is sort of a confession. Issues of synchrony, asynchrony, and synchronization, arise frequently in designing embedded systems from components, like everyone I k...
Albert Benveniste