Sciweavers

726 search results - page 75 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
14 years 2 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
IWCMC
2006
ACM
14 years 1 months ago
Cross-layer performance analysis of joint rate and power adaptation schemes with multiple-user contention in Nakagami fading cha
Adaptively adjusting transmission rate and power to concurrently enhance goodput and save energy is an important issue in the wireless local area network (WLAN). However, goodput ...
Li-Chun Wang, Kuang-Nan Yen, Jane-Hwa Huang, Ander...
CHI
1993
ACM
13 years 11 months ago
Relativity controller: reflecting user perspective in document spaces
As the ease of accessing and generating large quantities of information increases, people’s ability to navigate through that information and maintain personal perspective decrea...
Eric Justin Gould
WCNC
2008
IEEE
14 years 2 months ago
Performance Comparison of Uplink WLANs with Single-User and Multi-User MIMO Schemes
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...