Sciweavers

726 search results - page 141 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
MSN
2005
Springer
165views Sensor Networks» more  MSN 2005»
14 years 2 months ago
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
In the area of wireless mobile communication, minimizing energy consumption as well as maximizing data throughput in medium access control (MAC) layer is a very important research ...
Changsu Suh, Young-Bae Ko, Jai-Hoon Kim
SIMUTOOLS
2008
13 years 10 months ago
An 802.16 model for NS2 simulator with an integrated QoS architecture
The IEEE 802.16 technology is emerging as a promising solution for BWA due to its ability to support multimedia services and to operate in multiple physical environments. Also, wi...
Ikbal Chammakhi Msadaa, Fethi Filali, Farouk Kamou...
BPSC
2009
190views Business» more  BPSC 2009»
13 years 9 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 1 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
SP
1989
IEEE
14 years 18 days ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik