Sciweavers

1133 search results - page 116 / 227
» Modeling and Control of Distributed Asynchronous Computation...
Sort
View
CSREASAM
2006
15 years 3 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
FAC
2010
107views more  FAC 2010»
15 years 29 days ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
SENSYS
2009
ACM
15 years 9 months ago
Explicit and precise rate control for wireless sensor networks
The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive inc...
Avinash Sridharan, Bhaskar Krishnamachari
RTSS
2009
IEEE
15 years 9 months ago
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
—Emerging applications of wireless sensor networks (WSNs) require real-time quality of service (QoS) guarantees to be provided by the network. However, designing real-time schedu...
Yunbo Wang, Mehmet C. Vuran, Steve Goddard
120
Voted
DAC
2008
ACM
16 years 3 months ago
Variation-adaptive feedback control for networks-on-chip with multiple clock domains
This paper discusses the use of networks-on-chip (NoCs) consisting of multiple voltage-frequency islands to cope with power consumption, clock distribution and parameter variation...
Ümit Y. Ogras, Diana Marculescu, Radu Marcule...