Sciweavers

236 search results - page 2 / 48
» Model of primary and secondary context
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
CHI
2005
ACM
14 years 7 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
WCNC
2010
IEEE
13 years 11 months ago
Credit-Based Spectrum Sharing for Cognitive Mobile Multihop Relay Networks
Abstract—In cognitive mobile multihop relay (CMMR) network, the mobile user as the primary user is allocated with the channel for transmitting data. Relay station as the secondar...
Dusit Niyato, Ping Wang
GLOBECOM
2009
IEEE
13 years 10 months ago
Measurement Based Capacity Scavenging via Whitespace Modeling in Wireless Networks
Dynamic Spectrum Access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless networ...
Anthony Plummer Jr., Mahmoud Taghizadeh, Subir Bis...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 5 months ago
Cooperative Cognitive Radio with Priority Queueing Analysis
In this paper, we model the hierarchical structures inherent in cognitive radio networks as the priority queueing system in which primary users interact with the highest priority a...
Caoxie Zhang, Xinbing Wang, Jun Li