Sciweavers

798 search results - page 22 / 160
» Comparing the expressive power of access control models
Sort
View
SENSYS
2004
ACM
14 years 1 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
WIKIS
2010
ACM
13 years 11 months ago
Deep hypertext with embedded revision control implemented in regular expressions
While text versioning was definitely a part of the original hypertext concept [21, 36, 44], it is rarely considered in this context today. Still, we know that revision control un...
Victor S. Grishchenko
CCS
2009
ACM
14 years 8 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
VTC
2007
IEEE
14 years 1 months ago
A Power-Controlled 2-Dimensional Block Spread DS-CDMA Cellular System with Uplink Site Selection Diversity
—2-dimensional (2D) block spread direct sequence-code division multiple access (DS-CDMA) allows uplink mutlirate/mutli-connection transmissions without causing a serious multi-ac...
Le Liu, Fumiyuki Adachi
ECEASST
2008
106views more  ECEASST 2008»
13 years 7 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan