Sciweavers

115 search results - page 16 / 23
» Hidden access control policies with hidden credentials
Sort
View
INFOCOM
2000
IEEE
13 years 12 months ago
Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks
Abstract—We introduce and analyze CARMA-MC (for Collision Avoidance and Resolution Multiple Access MultiChannel), a new stable channel access protocol for multihop wireless netwo...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
EUROMICRO
1998
IEEE
13 years 11 months ago
The Latency Hiding Effectiveness of Decoupled Access/Execute Processors
Several studies have demonstrated that out-of-order execution processors may not be the most adequate organization for wide issue processors due to the increasing penalties that w...
Joan-Manuel Parcerisa, Antonio González
VIZSEC
2005
Springer
14 years 28 days ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
TON
1998
107views more  TON 1998»
13 years 7 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...