Sciweavers

327 search results - page 54 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 4 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
DEXA
2006
Springer
121views Database» more  DEXA 2006»
14 years 1 months ago
DCF: An Efficient Data Stream Clustering Framework for Streaming Applications
Streaming applications, such as environment monitoring and vehicle location tracking require handling high volumes of continuously arriving data and sudden fluctuations in these vo...
Kyungmin Cho, SungJae Jo, Hyukjae Jang, Su Myeon K...
JSAC
2007
142views more  JSAC 2007»
13 years 10 months ago
Non-Cooperative Resource Competition Game by Virtual Referee in Multi-Cell OFDMA Networks
— In this paper, a distributive non-cooperative game is proposed to perform sub-channel assignment, adaptive modulation, and power control for multi-cell multi-user Orthogonal Fr...
Zhu Han, Zhu Ji, K. J. Ray Liu
IMC
2010
ACM
13 years 8 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
TMC
2008
107views more  TMC 2008»
13 years 10 months ago
A Mutual Network Synchronization Method for Wireless Ad Hoc and Sensor Networks
Mutual network synchronization is a distributed method in which geographically separated clocks align their times to one another without the need of reference or master clocks. Mut...
Carlos H. Rentel, Thomas Kunz