Sciweavers

1560 search results - page 58 / 312
» Adaptive News Access
Sort
View
SODA
2003
ACM
127views Algorithms» more  SODA 2003»
13 years 10 months ago
The set-associative cache performance of search trees
We consider the costs of access to data stored in search trees assuming that those memory accesses are managed with a cache. Our cache memory model is two-level, has a small degre...
James D. Fix
GLOBECOM
2009
IEEE
14 years 13 days ago
Iterative Versus Adaptive Equalizers in Time-Variant Channels
—This paper discusses the application of iterative versus adaptive equalizers to a Universal Mobile Telecommunications System (UMTS) High Speed Downlink Packet Access (HSDPA) rec...
Clemens Buchacher, Joachim Wehinger, Mario Huemer
ISPEC
2005
Springer
14 years 2 months ago
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Abstract. Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with...
Kung Chen, Chih-Mao Huang
SWS
2004
ACM
14 years 2 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 3 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar