Sciweavers

327 search results - page 8 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
JSAC
2011
167views more  JSAC 2011»
13 years 2 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
ER
1999
Springer
152views Database» more  ER 1999»
14 years 2 days ago
Semantically Accessing Documents Using Conceptual Model Descriptions
. When publishing documents on the web, the user needs to describe and classify her documents for the benefit of later retrieval and use. This paper presents an approach to semanti...
Terje Brasethvik, Jon Atle Gulla
WCE
2007
13 years 9 months ago
Genetic Algorithm Optimized PI and Fuzzy Sliding Mode Speed Control for DTC Drives
— This paper presents a detailed comparison between a conventional PI controller and a variable structure controller based on a fuzzy sliding mode strategy used for speed control...
Shady M. Gadoue, Damian Giaouris, J. W. Finch
ISICT
2003
13 years 9 months ago
Intelligent access and mobility management in heterogeneous wireless networks using policy
The next generation of mobile networks will utilise multiple radio access technologies. These heterogeneous wireless networks will enable the user to seamlessly roam between the d...
Ken Murray, Rajiv Mathur, Dirk Pesch
ESORICS
2007
Springer
14 years 2 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano