Sciweavers

798 search results - page 35 / 160
» Comparing the expressive power of access control models
Sort
View
SACMAT
2005
ACM
14 years 1 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 7 months ago
Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks
Two-ray ground reflection model has been widely used as the propagation model to investigate the performance of an ad hoc network. But two-ray model is too simple to represent a r...
Anwar Hossain, Mohammed Tarique, Rumana Islam
JSAC
2006
104views more  JSAC 2006»
13 years 7 months ago
A mathematical model of noise in narrowband power line communication systems
This manuscript introduces a mathematically tractable and accurate model of narrowband power line noise based on experimental measurements. In this paper, the noise is expressed as...
Masaaki Katayama, Takaya Yamazato, Hiraku Okada
GLOBECOM
2006
IEEE
14 years 1 months ago
Harnessing the Parity of Multiple Errors in End-to-End MAC Schemes
— We present the results of simulation experiments that compare end-to-end error management (used in controlled access MAC protocols) against hop-by-hop error management (used in...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...
BMCBI
2004
154views more  BMCBI 2004»
13 years 7 months ago
Accuracy of cDNA microarray methods to detect small gene expression changes induced by neuregulin on breast epithelial cells
Background: cDNA microarrays are a powerful means to screen for biologically relevant gene expression changes, but are often limited by their ability to detect small changes accur...
Bin Yao, Sanjay N. Rakhade, Qunfang Li, Sharlin Ah...