Sciweavers

1818 search results - page 77 / 364
» How users use access control
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Opportunistic Access with Random Subchannel Backoff (OARSB) for OFDMA Uplink
Abstract— A distributed medium access control (MAC) algorithm for uplink OFDMA networks under the IEEE 802.16 framework is proposed and analyzed in this work. We present a simple...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
RBAC
1998
101views more  RBAC 1998»
13 years 10 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 21 days ago
Decentralized Online Learning Algorithms for Opportunistic Spectrum Access
—The fundamental problem of multiple secondary users contending for opportunistic spectrum access over multiple channels in cognitive radio networks has been formulated recently ...
Yi Gai, Bhaskar Krishnamachari
WIOPT
2010
IEEE
13 years 7 months ago
Competitive interference-aware spectrum access in cognitive radio networks
—Cognitive radio networks provide the capability to share the wireless channel with licensed (primary) users in an opportunistic manner. Primary users have a license to operate i...
Jocelyne Elias, Fabio Martignon, Antonio Capone, E...
JNCA
2008
113views more  JNCA 2008»
13 years 9 months ago
Hands-free vision-based interface for computer accessibility
Physically disabled and mentally challenged people are an important part of our society that has not yet received the same opportunities as others in their inclusion in the Inform...
Javier Varona, Cristina Manresa-Yee, Francisco J. ...