Sciweavers

804 search results - page 73 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CHI
2006
ACM
16 years 5 months ago
The design of an interactive and dynamic representation of the firm
Interpretation and audit of financial information is a significant undertaking that must rest on a fuller understanding of the firm and its operations. A pictorial representation ...
Lin Zhao, Julia Grant, Fred L. Collopy
USS
2008
15 years 7 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
JSAC
2006
83views more  JSAC 2006»
15 years 4 months ago
Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems
Ultra-wideband (UWB) transmission is an emerging wireless technology for future short-range indoor and outdoor multimedia applications. To coordinate the access to the wireless med...
Yang Xiao, Xuemin Shen, Hai Jiang
WCNC
2010
IEEE
15 years 8 months ago
ROPA: A MAC Protocol for Underwater Acoustic Networks with Reverse Opportunistic Packet Appending
—In most existing sender-initiated handshaking based underwater Media Access Control (MAC) protocols, only the initiating sender is allowed to transmit data packets to its intend...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani
CSE
2009
IEEE
15 years 8 months ago
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens
Abstract--Web 2.0 users have many choices of contenthosting or application-service providers (CSPs). It can be difficult for a user to share content with a set of real-life friends...
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov