Sciweavers

5252 search results - page 895 / 1051
» Logic in Access Control
Sort
View
CCS
2008
ACM
15 years 6 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
CCS
2008
ACM
15 years 6 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
CISS
2008
IEEE
15 years 6 months ago
Cross-layer multicommodity capacity expansion on ad hoc wireless networks of cognitive radios
Cognitive radios permit dynamic control of physical layer resources such as transmission power and constellation size; these degrees of freedom can be employed to achieve significa...
Alex Fridman, Steven Weber, Kapil R. Dandekar, Mos...
AINA
2005
IEEE
15 years 6 months ago
Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet
— Bluetooth is a short-range TDD (Time Division Duplex) wireless network that supports both circuit- and packetoriented applications. A piconet is composed of a device configure...
Li-Hsing Yen, Chi-Hung Liao
DATE
2005
IEEE
138views Hardware» more  DATE 2005»
15 years 6 months ago
BB-GC: Basic-Block Level Garbage Collection
Memory space limitation is a serious problem for many embedded systems from diverse application domains. While circuit/packaging techniques are definitely important to squeeze la...
Ozcan Ozturk, Mahmut T. Kandemir, Mary Jane Irwin