Sciweavers

3712 search results - page 134 / 743
» Role-Based Access Control
Sort
View
VTC
2010
IEEE
157views Communications» more  VTC 2010»
13 years 8 months ago
Cross-Layer Solutions for Cooperative Medium Access Control Protocols
— Recent studies have shown that designing a Medium Access Control (MAC) protocol combined with a cooperative approach may improve the attainable network throughput, despite redu...
Alessandro Crismani, Fulvio Babich, Lajos Hanzo
CASSIS
2005
Springer
14 years 3 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
IASTEDSE
2004
13 years 11 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
FLAIRS
2001
13 years 11 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...