Sciweavers

4592 search results - page 653 / 919
» Framework for Studying Substitution
Sort
View
ACSAC
2008
IEEE
14 years 5 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
CBMS
2008
IEEE
14 years 5 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 5 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
CEC
2008
IEEE
14 years 5 months ago
Memetic Gradient Search
—This paper reviews the different gradient-based schemes and the sources of gradient, their availability, precision and computational complexity, and explores the benefits of usi...
Boyang Li, Yew-Soon Ong, Minh Nghia Le, Chi Keong ...
CISS
2008
IEEE
14 years 5 months ago
Bandwidth exchange as an incentive for relaying
Abstract—Relay cooperation has been recognized as an important mechanism to enhance connectivity and throughput in multi-hop wireless networks, especially under varying channel c...
Dan Zhang, Omer Ileri, Narayan B. Mandayam