Sciweavers

1000 search results - page 183 / 200
» Application Access Control at Network Level
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
IEEECIT
2006
IEEE
14 years 2 months ago
A Consistency Maintenance Approach in Replicated Services
Service-oriented architecture (SOA) making the interactions between applications much easier, but the service delay and unstable network will block the whole business process. Rep...
Jiangming Yang, Qiwei Zhang, Ning Gu
ISVLSI
2006
IEEE
104views VLSI» more  ISVLSI 2006»
14 years 2 months ago
Adaptive Signal Processing in Mixed-Signal VLSI with Anti-Hebbian Learning
We describe analog and mixed-signal primitives for implementing adaptive signal-processing algorithms in VLSI based on anti-Hebbian learning. Both on-chip calibration techniques a...
Miguel Figueroa, Esteban Matamala, Gonzalo Carvaja...
ICMCS
2005
IEEE
183views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Bandwidth Estimation and Robust Video Streaming Over 802.11E Wireless Lans
Streaming high quality audio/video (AV) from home media sources to TV sets over a wireless local area network (WLAN) is a challenging problem because of the fluctuating bandwidth...
Mehmet Umut Demircin, Peter van Beek
ISCC
2003
IEEE
14 years 1 months ago
Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...