Sciweavers

270 search results - page 41 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
RSP
1998
IEEE
188views Control Systems» more  RSP 1998»
13 years 12 months ago
Performance and Interface Buffer Size Driven Behavioral Partitioning for Embedded Systems
One of the major differences in partitioning for codesign is in the way the communication cost is evaluated. Generally the size of the edge cut-set is used. When communication bet...
T.-C. Lin, Sadiq M. Sait, Walling R. Cyre
TC
2002
13 years 7 months ago
On Transaction Processing with Partial Validation and Timestamp Ordering in Mobile Broadcast Environments
Conventional concurrency control protocols are inapplicable in mobile broadcast environments due to a number of constraints of wireless communications. Previous studies are focuse...
Victor C. S. Lee, Kwok-Wa Lam, Sang Hyuk Son, Eddi...
FGIT
2010
Springer
13 years 5 months ago
Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets
Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS free as well as GPS scarce positioning systems for ...
S. Mangai, A. Tamilarasi
SACMAT
2003
ACM
14 years 25 days ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
JSAC
2010
142views more  JSAC 2010»
13 years 2 months ago
Handling inelastic traffic in wireless sensor networks
The capabilities of sensor networking devices are increasing at a rapid pace. It is therefore not impractical to assume that future sensing operations will involve real time (inela...
Jiong Jin, Avinash Sridharan, Bhaskar Krishnamacha...