Sciweavers

453 search results - page 19 / 91
» Controllability analysis for current profile control in toka...
Sort
View
TDSC
2008
152views more  TDSC 2008»
13 years 7 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha
WOWMOM
2009
ACM
158views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Admission control based on OFDMA channel transformations
It is well known that channel-dependent OFDMA resource assignment algorithms provide a significant performance improvement compared to static (i.e. channelunaware) approaches. Su...
James Gross
INFOCOM
2007
IEEE
14 years 2 months ago
An Experimental Evaluation of Voice Quality Over the Datagram Congestion Control Protocol
— Most Internet telephony applications currently use either TCP or UDP to carry their voice-over-IP (VoIP) traffic. This choice can be problematic, because TCP is not well suite...
H. Vlad Balan, Lars Eggert, Saverio Niccolini, Mar...
BMCBI
2008
114views more  BMCBI 2008»
13 years 7 months ago
TiGER: A database for tissue-specific gene expression and regulation
Background: Understanding how genes are expressed and regulated in different tissues is a fundamental and challenging question. However, most of currently available biological dat...
Xiong Liu, Xueping Yu, Donald J. Zack, Heng Zhu, J...