Sciweavers

959 search results - page 113 / 192
» Possible and Necessary h-Indices
Sort
View
SACMAT
2010
ACM
14 years 1 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SIGMETRICS
2010
ACM
223views Hardware» more  SIGMETRICS 2010»
14 years 1 months ago
Self-synchronizing properties of CSMA wireless multi-hop networks
We show that CSMA is able to spontaneously synchronize transmissions in a wireless network with constant-size packets, and that this property can be used to devise efficient synch...
Kuang Xu, Olivier Dousse, Patrick Thiran
COLCOM
2009
IEEE
14 years 1 months ago
Square region-based coverage and connectivity probability model in wireless sensor networks
—Sensing coverage and network connectivity are two fundamental issues in wireless sensor networks (WSNs). Due to resource constraints of sensor nodes, it may not be possible, or ...
Xiaofei Xing, Guojun Wang, Jie Wu, Jie Li
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
14 years 1 months ago
Information Fusion in Biometrics
User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric tra...
Arun Ross, Anil K. Jain, Jian Zhong Qian
ACSAC
2000
IEEE
14 years 1 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim