Sciweavers

1818 search results - page 103 / 364
» How users use access control
Sort
View
114
Voted
TWC
2008
188views more  TWC 2008»
15 years 2 months ago
Joint power control and beamforming for cognitive radio networks
We consider a secondary usage of spectrum scenario where a secondary network coexists and/or shares the radio spectrum with a primary network to which the spectrum is licensed. The...
Habibul Islam, Ying-Chang Liang, Anh Tuan Hoang
ISI
2006
Springer
15 years 2 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
121
Voted
GI
2009
Springer
15 years 12 days ago
Introducing Community Single Sign-On for EDIT
: The European Distributed Institute of Taxonomy (EDIT) platform, as well as biodiversity providers in general, provides a multitude of web-based taxonomic applications and service...
Lutz Suhrbier
118
Voted
ICLP
2007
Springer
15 years 6 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
100
Voted
ICCCN
2007
IEEE
15 years 9 months ago
An overlay approach for enabling access to dynamically shared backbone GMPLS networks
— In this paper, we address the question of how to introduce new Quality-of-Service enhancements into the existing Internet. Specifically, dynamically shared circuitswitched/vir...
Xiuduan Fang, Malathi Veeraraghavan, Mark E. McGin...