Sciweavers

726 search results - page 120 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
14 years 8 months ago
XML schema
The United States Environmental Protection Agency (EPA) prepares a national criteria and hazardous air pollutant (HAP) emission inventory with input from numerous states, local an...
Charles E. Campbell, Andrew Eisenberg, Jim Melton
INFOCOM
2002
IEEE
14 years 22 days ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...
FAST
2003
13 years 9 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
AROBOTS
2004
77views more  AROBOTS 2004»
13 years 7 months ago
Planetary Cliff Descent Using Cooperative Robots
Future robotic planetary exploration will need to traverse geographically diverse and challenging terrain. Cliffs, ravines, and fissures are of great scientific interest because th...
Erik Mumm, Shane Farritor, Paolo Pirjanian, Chris ...
EUROSYS
2007
ACM
14 years 4 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...