Sciweavers

804 search results - page 44 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
WOWMOM
2006
ACM
158views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Vasilios A. Siris, Costas Courcoubetis
CAD
2011
Springer
14 years 11 months ago
Mesh repair with user-friendly topology control
Limitations of current 3D acquisition technology often lead to polygonal meshes exhibiting a number of geometrical and topological defects which prevent them from widespread use. ...
Franck Hétroy, Stéphanie Rey, Carlos...
JSAC
2008
111views more  JSAC 2008»
15 years 4 months ago
The end-to-end rate control in multiple-hop wireless networks: Cross-layer formulation and optimal allocation
In this paper, we study the theoretical problem of the end-to-end rate assignment for multi-hop wireless networks. Specifically, we consider the problem of joint congestion control...
Chengnian Long, Bo Li, Qian Zhang, Bin Zhao, Bo Ya...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 5 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
FGCS
2007
90views more  FGCS 2007»
15 years 4 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran