Sciweavers

355 search results - page 59 / 71
» Orthogonal multiuser detection
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 11 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
ICIP
2005
IEEE
14 years 9 months ago
Risk minimization in traitors within traitors in multimedia forensics
In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system...
H. Vicky Zhao, K. J. Ray Liu
OSDI
2002
ACM
14 years 8 months ago
Ivy: A Read/Write Peer-to-Peer File System
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...
ICSE
2007
IEEE-ACM
14 years 8 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
VTC
2008
IEEE
107views Communications» more  VTC 2008»
14 years 2 months ago
Performance of Relay-Aided DS-CDMA Downlink Systems Communicating over Nakagami-m Fading Channels
—In this contribution we investigate the bit-error-rate (BER) performance of a downlink direct-sequence code-division multiple-access (DS-CDMA) system, where a set of relays are ...
Wei Fang, Lie-Liang Yang, Lajos Hanzo