Sciweavers

653 search results - page 55 / 131
» Addressing interoperability issues in access control models
Sort
View
COMAD
2008
13 years 9 months ago
Exploiting Asynchronous IO using the Asynchronous Iterator Model
Asynchronous IO (AIO) allows a process to continue to do other work while an IO operation initiated earlier completes. AIO allows a large number of random IO operations to be issu...
Suresh Iyengar, S. Sudarshan, Santosh Kumar 0002, ...
MOBIHOC
2002
ACM
14 years 7 months ago
Priority scheduling in wireless ad hoc networks
Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and "hidden terminal" problem ma...
Xue Yang, Nitin H. Vaidya
WISTP
2010
Springer
13 years 5 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
14 years 23 days ago
An algorithm for estimating time-varying commodity price models
— Given the current financial crisis, there is renewed interest in modelling how the price of commodities change in the market. Traditionally, such models have assumed constant ...
Boris I. Godoy, Graham C. Goodwin, Juan C. Agü...
ESWS
2008
Springer
13 years 9 months ago
Entity Lifecycle Management for OKKAM
In this paper, we examine the special requirements of lifecycle management for entities in the context of an entity management system for the semantic web. We study the requirement...
Junaid Ahsenali Chaudhry, Themis Palpanas, Perikli...