Sciweavers

477 search results - page 22 / 96
» Guideline: Multiple Hierarchies
Sort
View
ECOOP
2000
Springer
13 years 12 months ago
Empirical Study of Object-Layout Strategies and Optimization Techniques
Althoughthereisalargebodyofresearchonthetimeoverheadofobject oriented programs, there is little work on memory overhead. This paper takes an empirical approach to the study of this...
Natalie Eckel, Joseph Gil
ICCSA
2003
Springer
14 years 26 days ago
An Enhanced Hand-Off Policy to Reduce Blocking Probability in Two-Layer Wireless Systems
Abstract. In this paper, we consider a two-layer hierarchy, ı.e. micro and umbrella layer, cellular system, and propose a new hand-off mechanism to minimize call blocking probabil...
Tae-Jin Lee
IEEESP
2010
82views more  IEEESP 2010»
13 years 6 months ago
Scenario-Driven Role Engineering
Role engineering for role-based access control (RBAC) is a process to define roles, permissions, constraints, and role hierarchies. The scenario-driven role engineering process pr...
Mark Strembeck
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 11 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
TIT
2008
65views more  TIT 2008»
13 years 7 months ago
Power-Efficient Resource Allocation for Time-Division Multiple Access Over Fading Channels
We investigate resource allocation policies for time-division multiple access (TDMA) over fading channels in the power-limited regime. For frequency-flat block-fading channels and ...
Xin Wang, Georgios B. Giannakis