Sciweavers

327 search results - page 9 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
DSS
2007
124views more  DSS 2007»
13 years 7 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
Contention-Based Medium Access Control with Physical Layer Assisted Link Differentiation
— In this paper, we develop contention-based medium access control (MAC) schemes for both best-effort data transmissions and delay-sensitive multimedia transmissions over WLANs. ...
Fanglei Sun, Victor O. K. Li, Zhifeng Diao, Zhengy...
MVA
2000
111views Computer Vision» more  MVA 2000»
13 years 9 months ago
A Face Recognition Terminal with Effective Illumination for Access Control Systems
In this paper, a high-performance face recognition terminal for access control systems is described. The terminal is specially designed to acquire stable face patterns for reliabl...
Toshio Sato, Hiroshi Sukegawa, Kentaro Yokoi, Akio...
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
14 years 5 days ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang
IEEEARES
2009
IEEE
14 years 2 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...