Sciweavers

804 search results - page 49 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ESOP
2003
Springer
15 years 9 months ago
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers
In complex systems, like robot plants, applications are built on top of a set of components, or devices. Each of them has particular individual constraints, and there are also log...
Karine Altisen, Aurélie Clodic, Florence Ma...
JISE
2008
151views more  JISE 2008»
15 years 4 months ago
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Supporting telephone services using wireless LAN as the access network is an important application nowadays. The SIP and IEEE 802.11e are the two most promising protocols to suppo...
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei ...
CC
2008
Springer
144views System Software» more  CC 2008»
15 years 6 months ago
Control Flow Emulation on Tiled SIMD Architectures
Heterogeneous multi-core and streaming architectures such as the GPU, Cell, ClearSpeed, and Imagine processors have better power/ performance ratios and memory bandwidth than tradi...
Ghulam Lashari, Ondrej Lhoták, Michael McCo...
MOBILITY
2009
ACM
15 years 9 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
COMCOM
2006
103views more  COMCOM 2006»
15 years 4 months ago
Energy efficiency of collision resolution protocols
Energy consumption of the medium access control (MAC) algorithm is one of the key performance metrics in today's ubiquitous wireless networks of battery-operated devices. We ...
Aran Bergman, Moshe Sidi