Sciweavers

270 search results - page 29 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
ASAP
2004
IEEE
171views Hardware» more  ASAP 2004»
13 years 11 months ago
CHARMED: A Multi-Objective Co-Synthesis Framework for Multi-Mode Embedded Systems
In this paper, we present a modular co-synthesis framework called CHARMED that solves the problem of hardware-software co-synthesis of periodic, multi-mode, distributed, embedded ...
Vida Kianzad, Shuvra S. Bhattacharyya
FAST
2003
13 years 9 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
MASCOTS
2004
13 years 9 months ago
MC-CDMA Based IEEE 802.11 Wireless LAN
In this paper, a modified version of the IEEE 802.11a protocol is proposed and evaluated. We combine MultiCarrier Code Division Multiple Access (MC-CDMA), a novel, high capacity m...
Georgios Orfanos, Jörg Habetha, Ling Liu
ICDCS
2005
IEEE
14 years 1 months ago
Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout
We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossipbased protocol using adaptive fanout. We model three versions of go...
Satish Verma, Wei Tsang Ooi
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 7 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis