Sciweavers

663 search results - page 53 / 133
» Process Algebra with Local Communication
Sort
View
ACISP
2008
Springer
14 years 4 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
SIGSOFT
1998
ACM
14 years 2 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
AVSS
2006
IEEE
14 years 4 months ago
Optimal Power Scheduling for Data Fusion in Inhomogeneous Wireless Sensor Networks
We consider the problem of optimal power scheduling for the decentralized detection of a deterministic signal in an inhomogeneous wireless sensor network. The observation noise at...
Thakshila Wimalajeewa, Sudharman K. Jayaweera
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 4 months ago
Cell Search for Cell-Based OFDM Systems Using Quasi Complete Complementary Codes
Abstract—Establishing a radio link in cell-based mobile communication systems involves searching and synchronizing the downlink known pattern of sequences associated with the bas...
Chao-Yu Chen, Ying-Ju Min, Kuei-Ying Lu, Chi-Chao ...
TSE
2008
97views more  TSE 2008»
13 years 10 months ago
Timed Automata Patterns
Timed Automata have proven to be useful for specification and verification of real-time systems. System design using Timed Automata relies on explicit manipulation of clock variabl...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...