Sciweavers

798 search results - page 50 / 160
» Comparing the expressive power of access control models
Sort
View
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 10 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
14 years 2 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 9 months ago
Access-Network Association Policies for Media Streaming in Heterogeneous Environments
Abstract--We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective ...
Ali ParandehGheibi, Muriel Médard, Asuman E...
VTC
2006
IEEE
110views Communications» more  VTC 2006»
14 years 2 months ago
On Modelling Spatial Traffic and Service Non-Uniformities in WCDMA Reverse Link
— This paper focuses on the modelling of the reverse link of a WCDMA system in a non-homogeneous environment. Multiple traffic spatial and service non-uniformities are considered...
Ferran Adelantado, Oriol Sallent, Jordi Pér...
IPPS
2003
IEEE
14 years 2 months ago
Importance of SIMD Computation Reconsidered
In this paper, SIMD and MIMD solutions for the realtime database management problem of air traffic control are compared. A real-time database system is highly constrained in a mul...
Will C. Meilander, Johnnie W. Baker, Mingxian Jin