Sciweavers

872 search results - page 99 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ICC
2009
IEEE
147views Communications» more  ICC 2009»
14 years 2 months ago
Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks
—Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly p...
Eren Gürses, Yuan Lin, Raouf Boutaba
CCS
2008
ACM
13 years 9 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
IPL
2008
82views more  IPL 2008»
13 years 7 months ago
Confusion of memory
It is a truism that for a machine to have a useful access to memory or workspace, it must "know" where its input ends and its working memory begins. Most machine models ...
Lawrence S. Moss
ANTSW
2008
Springer
13 years 9 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
FCCM
2007
IEEE
111views VLSI» more  FCCM 2007»
14 years 2 months ago
A Structural Object Programming Model, Architecture, Chip and Tools for Reconfigurable Computing
A new platform for reconfigurable computing has an object-based programming model, with architecture, silicon and tools designed to faithfully realize this model. The platform is ...
Michael Butts, Anthony Mark Jones, Paul Wasson