Sciweavers

1818 search results - page 119 / 364
» How users use access control
Sort
View
FTNET
2007
107views more  FTNET 2007»
13 years 9 months ago
Network Optimization and Control
We study how protocol design for various functionalities within a communication network architecture can be viewed as a distributed resource allocation problem. This involves unde...
Srinivas Shakkottai, R. Srikant
COLCOM
2005
IEEE
14 years 2 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
ESAW
2008
Springer
13 years 11 months ago
Peer Pressure as a Driver of Adaptation in Agent Societies
We consider a resource access control scenario in an open multi-agent system. We specify a mutable set of rules to determine how resource allocation is decided, and minimally assum...
Hugo Carr, Jeremy V. Pitt, Alexander Artikis
VTC
2010
IEEE
123views Communications» more  VTC 2010»
13 years 7 months ago
Downlink Power Control Scheme for Smart Antenna Based Wireless Systems
— In this paper, we propose a downlink power control scheme for a wireless system which utilizes a smart antenna technology for space division multiple access(SDMA). In the wirel...
Woongsup Lee, Dong-Ho Cho
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...