Sciweavers

804 search results - page 69 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
137
Voted
SSS
2007
Springer
15 years 10 months ago
Self-stabilization and Virtual Node Layer Emulations
We present formal definitions of stabilization for the Timed I/O Automata (TIOA) framework, and of emulation for the timed Virtual Stationary Automata programming abstraction laye...
Tina Nolte, Nancy A. Lynch
129
Voted
VTC
2006
IEEE
109views Communications» more  VTC 2006»
15 years 10 months ago
Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput
— IEEE 802.11 WLAN has been widely accepted throughout the world. However, it has large overhead due to idle backoff slots and frequent collisions depending on the number of node...
Hojin Lee, Jaeyoung Choi, Taekyoung Kwon, Yanghee ...
142
Voted
MADNES
2005
Springer
15 years 10 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
EUROSSC
2006
Springer
15 years 8 months ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ARC
2010
Springer
167views Hardware» more  ARC 2010»
15 years 8 months ago
Systolic Algorithm Mapping for Coarse Grained Reconfigurable Array Architectures
Coarse Grained Reconfigurable Array (CGRA) architectures give high throughput and data reuse for regular algorithms while providing flexibility to execute multiple algorithms on th...
Kunjan Patel, Chris J. Bleakley