Sciweavers

1818 search results - page 109 / 364
» How users use access control
Sort
View
HOTOS
1997
IEEE
14 years 1 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
HPCA
1999
IEEE
14 years 1 months ago
Impulse: Building a Smarter Memory Controller
Impulse is a new memory system architecture that adds two important features to a traditional memory controller. First, Impulse supports application-specific optimizations through...
John B. Carter, Wilson C. Hsieh, Leigh Stoller, Ma...
W4A
2006
ACM
14 years 3 months ago
Personalizable edge services for web accessibility
Web Content Accessibility guidelines by W3C [29] provide several suggestions for Web designers on how to author Web pages in order to make them accessible to everyone. In this con...
Gennaro Iaccarino, Delfina Malandrino, Vittorio Sc...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
14 years 9 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah
ICC
2009
IEEE
149views Communications» more  ICC 2009»
13 years 7 months ago
Adoption of Cognitive Radio Scheme to Class-Based Call Admission Control
Abstract--By using cognitive radio technology, opportunistic spectrum access has the potential to solve the underused spectrum problem. In this paper, we employ class-based call ad...
Dongyue Xue, Hui Yu, Xinbing Wang, Hsiao-Hwa Chen