Sciweavers

1818 search results - page 75 / 364
» How users use access control
Sort
View
GLOBECOM
2006
IEEE
14 years 3 months ago
Window And Backwards Decoding Achieve the Same Sum Rate for the Fading Cooperative Gaussian Multiple Access Channel
— For a two user fading Gaussian multiple access channel with user cooperation, we show that window decoding achieves the same sum rate as backwards decoding, when the encoding i...
Onur Kaya
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 3 months ago
Power Control in Cognitive Radio Systems Based on Spectrum Sensing Side Information
— Cognitive radio has been recently proposed as a promising technology to improve the spectrum utilization efficiency by intelligently sensing and accessing some vacant bands of...
Karama Hamdi, Wei Zhang, Khaled Ben Letaief
SACMAT
2009
ACM
14 years 1 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
JOCN
2011
141views more  JOCN 2011»
13 years 6 hour ago
Changes in Events Alter How People Remember Recent Information
■ Observers spontaneously segment larger activities into smaller events. For example, “washing a car” might be segmented into “scrubbing,” “rinsing,” and “drying...
Khena M. Swallow, Deanna M. Barch, Denise Head, Co...
FGCS
2007
172views more  FGCS 2007»
13 years 9 months ago
From access and integration to mining of secure genomic data sets across the Grid
The UK Department of Trade and Industry (DTI) funded BRIDGES project (Biomedical Research Informatics Delivered by Grid Enabled Services) has developed a Grid infrastructure to su...
Richard O. Sinnott