Sciweavers

1818 search results - page 143 / 364
» How users use access control
Sort
View
GLOBECOM
2009
IEEE
14 years 1 months ago
Optimum Allocation of Energy and Spectrum in Power-Controlled Wireless Networks with QoS Constraints
An important performance measure in wireless networks is the manner in which the network can distributively manage its limited energy and spectrum resources, while assuring certain...
Stepán Kucera, Ludek Kucera, Bing Zhang
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 3 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
CIKM
2006
Springer
14 years 1 months ago
Information retrieval from relational databases using semantic queries
Relational databases are widely used today as a mechanism for providing access to structured data. They, however, are not suitable for typical information finding tasks of end use...
Anand Ranganathan, Zhen Liu
WSC
2004
13 years 10 months ago
Investigation of Error Rates When Controlling Multiple Uninhabited Combat Aerial Vehicles
As systems become more and more complex the use of automation tools becomes more important. Although automation is introduced to reduce human workload, improve situational awarene...
Sasanka V. Prabhala, Jennie J. Gallimore
TLT
2008
149views more  TLT 2008»
13 years 9 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...