Sciweavers

1818 search results - page 103 / 364
» How users use access control
Sort
View
TWC
2008
188views more  TWC 2008»
13 years 9 months ago
Joint power control and beamforming for cognitive radio networks
We consider a secondary usage of spectrum scenario where a secondary network coexists and/or shares the radio spectrum with a primary network to which the spectrum is licensed. The...
Habibul Islam, Ying-Chang Liang, Anh Tuan Hoang
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
GI
2009
Springer
13 years 7 months ago
Introducing Community Single Sign-On for EDIT
: The European Distributed Institute of Taxonomy (EDIT) platform, as well as biodiversity providers in general, provides a multitude of web-based taxonomic applications and service...
Lutz Suhrbier
ICLP
2007
Springer
14 years 1 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
ICCCN
2007
IEEE
14 years 3 months ago
An overlay approach for enabling access to dynamically shared backbone GMPLS networks
— In this paper, we address the question of how to introduce new Quality-of-Service enhancements into the existing Internet. Specifically, dynamically shared circuitswitched/vir...
Xiuduan Fang, Malathi Veeraraghavan, Mark E. McGin...