Sciweavers

151 search results - page 4 / 31
» Flexible Alias Protection
Sort
View
TASE
2008
IEEE
14 years 2 months ago
A Fundamental Permission Interpretation for Ownership Types
This paper builds a bridge between permissions and ownership types. Ownership is a recognized alias control technique. With ownership, each object is assigned an owner and any acc...
Yang Zhao, John Boyland
TWC
2008
143views more  TWC 2008»
13 years 7 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
COMPSAC
1998
IEEE
13 years 12 months ago
Capability-Based Protection for Integral Object-Oriented Systems
Protection is an essential issue for the kind of heterogeneous distributed interoperable object environments, which Java and CORBA are a glimpse of. A uniform protection mechanism...
María Ángeles Díaz Fond&oacut...
CN
2008
76views more  CN 2008»
13 years 7 months ago
Efficient path protection in bi-directional WDM systems
Bi-directional WDM transmission is a technique that allows data to be transmitted simultaneously in both directions of a fiber, with different sets of wavelength channels for each...
Ji Li, Kwan L. Yeung, Chun-Kit Chan
ICT
2004
Springer
131views Communications» more  ICT 2004»
14 years 1 months ago
Fairness and Protection Behavior of Resilient Packet Ring Nodes Using Network Processors
The Resilient Packet Ring IEEE 802.17 is an evolving standard for the construction of Local and Metropolitan Area Networks. The RPR protocol scales to the demands of future packet ...
Andreas Kirstädter, Axel Hof, Walter Meyer, E...