Sciweavers

1818 search results - page 171 / 364
» How users use access control
Sort
View
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 9 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
QEST
2005
IEEE
14 years 3 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
EURONGI
2004
Springer
14 years 3 months ago
Admission Control in the Downlink of WCDMA/UMTS
In this paper, we develop a novel CAC algorithm that takes into account the mobility of users inside the cell with a focus on the downlink of third generation mobile systems. We ...
Salah-Eddine Elayoubi, Tijani Chahed
EUC
2008
Springer
13 years 11 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman
TWC
2008
159views more  TWC 2008»
13 years 9 months ago
Resource allocation for spectrum underlay in cognitive radio networks
A resource allocation framework is presented for spectrum underlay in cognitive radio networks. We consider both interference constraints for primary users and quality of service (...
Long Bao Le, Ekram Hossain