Sciweavers

534 search results - page 37 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
DGO
2007
150views Education» more  DGO 2007»
14 years 10 days ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
ESORICS
2011
Springer
12 years 10 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
VTC
2008
IEEE
185views Communications» more  VTC 2008»
14 years 5 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
VTC
2008
IEEE
152views Communications» more  VTC 2008»
14 years 5 months ago
Network Controlled Joint Radio Resource Management for Heterogeneous Networks
Abstract— In this paper, we propose a way of achieving optimality in radio resource management (RRM) for heterogeneous networks. We consider a micro or femto cell with two co-loc...
Marceau Coupechoux, Jean Marc Kelif, Philippe Godl...
ICNP
2009
IEEE
13 years 8 months ago
Achieving Efficiency and Fairness for Association Control in Vehicular Networks
Deploying city-wide 802.11 access points has made possible internet access in a vehicle, nevertheless it is challenging to maintain client performance at vehicular speed especially...
Lei Xie, Qun Li, Weizhen Mao, Jie Wu, Daoxu Chen