Sciweavers

316 search results - page 63 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
ADCM
1998
132views more  ADCM 1998»
13 years 6 months ago
Numerical solution of generalized Lyapunov equations
Two e cient methods for solving generalized Lyapunov equations and their implementations in FORTRAN 77 are presented. The rst one is a generalization of the Bartels{Stewart method...
Thilo Penzl
NCA
2003
IEEE
14 years 4 days ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis
GLOBECOM
2010
IEEE
13 years 4 months ago
SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs
Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this p...
Gautam D. Bhanage, Dipti Vete, Ivan Seskar, Dipank...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 1 months ago
Empirical Discussion on Directional MAC Protocols for Ad hoc Networks using Practice Smart Antennas
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
Masahiro Watanabe, Hikaru Mitsuhashi, Masaki Banda...
ENTCS
2007
168views more  ENTCS 2007»
13 years 6 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...