Sciweavers

798 search results - page 77 / 160
» Comparing the expressive power of access control models
Sort
View
JPDC
2007
209views more  JPDC 2007»
13 years 9 months ago
Application-aware integration of data collection and power management in wireless sensor networks
Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysi...
Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian
IEEESP
2008
136views more  IEEESP 2008»
13 years 9 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
TIT
2008
110views more  TIT 2008»
13 years 9 months ago
Optimal Cross-Layer Scheduling of Transmissions Over a Fading Multiaccess Channel
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the mediu...
Munish Goyal, Anurag Kumar, Vinod Sharma
EDBT
2012
ACM
308views Database» more  EDBT 2012»
11 years 11 months ago
Transactional stream processing
Many stream processing applications require access to a multitude of streaming as well as stored data sources. Yet there is no clear semantics for correct continuous query executi...
Irina Botan, Peter M. Fischer, Donald Kossmann, Ne...
ICASSP
2010
IEEE
13 years 9 months ago
Outage-optimal transmission in multiuser-MIMO Kronecker channels
In this work, we look at single user and multiuser Multiple-Input Multiple-Output (MIMO) beamforming networks with Channel Distribution Information (CDI). CDI does not need to be ...
Sagnik Ghosh, Bhaskar D. Rao, James R. Zeidler