Sciweavers

3303 search results - page 137 / 661
» Multidimensional Access Methods
Sort
View
IADIS
2003
13 years 11 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
TDSC
2008
152views more  TDSC 2008»
13 years 10 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
ISCAS
2005
IEEE
167views Hardware» more  ISCAS 2005»
14 years 3 months ago
Low-power log-MAP turbo decoding based on reduced metric memory access
Due to the powerful error correcting performance, turbo codes have been adopted in many wireless communication standards. Although several low-power techniques have been proposed,...
Dong-Soo Lee, In-Cheol Park
INFOCOM
2009
IEEE
14 years 4 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
ISVC
2007
Springer
14 years 4 months ago
Automatic Image Representation for Content-Based Access to Personal Photo Album
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
Edoardo Ardizzone, Marco La Cascia, Filippo Vella