Sciweavers

164 search results - page 6 / 33
» Intelligent High-Security Access Control
Sort
View
EDOC
2005
IEEE
14 years 1 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
LCN
2007
IEEE
14 years 1 months ago
A Novel MIMO-Aware Distributed Media Access Control Scheme for IEEE 802.11 Wireless Local Area Networks
—This paper proposes a new distributed media access control (MAC) scheme to improve the network performance of Multiple-Input Multiple-Output (MIMO) wireless systems. In particul...
Dan J. Dechene, Khalim Amjad Meerja, Abdallah Sham...
JSAC
2011
167views more  JSAC 2011»
13 years 2 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
VLDB
2004
ACM
245views Database» more  VLDB 2004»
14 years 27 days ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird
IJHPCN
2008
75views more  IJHPCN 2008»
13 years 7 months ago
Enhancing GridFTP performance using intelligent gateways
: To improve throughput of grid data servers under heavy loads or under denial of service attacks, it is important to service requests differentially, giving preference to ongoing ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...