Sciweavers

804 search results - page 33 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
COMCOM
2008
111views more  COMCOM 2008»
15 years 4 months ago
An admission control algorithm for multi-hop 802.11e-based WLANs
Recently, wireless local area network (WLAN) hotspots have been deployed in many areas (e.g., cafes, airports, university campuses). The new IEEE 802.11e standard further provides...
Yuxia Lin, Vincent W. S. Wong
HYBRID
2007
Springer
15 years 8 months ago
Solving Coverage Problems with Embedded Graph Grammars
We show how Embedded Graph Grammars (EGGs) are used to specify local interaction rules between mobile robots in a natural manner. This formalism allows us to treat local network to...
John-Michael McNew, Eric Klavins, Magnus Egerstedt
ISI
2005
Springer
15 years 9 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 5 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
NETCOOP
2007
Springer
15 years 10 months ago
How Expensive Is Link Utilization?
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in unde...
Rade Stanojevic, Robert Shorten