Sciweavers

3712 search results - page 556 / 743
» Role-Based Access Control
Sort
View
119
Voted
DSN
2008
IEEE
15 years 9 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
140
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Daisuke Umehara, Tomoya Hirano, Satoshi Denno, Mas...
121
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Antenna Selection Diversity Based MAC Protocol for MIMO Ad Hoc Wireless Networks
— In this paper, we propose a novel asynchronous Media Access Control (MAC) protocol, Opportunistic MAC (OMAC), for Multiple Input Multiple Output (MIMO) ad-hoc networks. The pro...
Abhijeet Bhorkar, B. S. Manoj, Bhaskar D. Rao, Ram...
149
Voted
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 9 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
90
Voted
ICC
2008
IEEE
15 years 9 months ago
On the End-to-End Delay Performance of Spatially Correlated Wireless Line Networks
— The analytical end-to-end (e2e) performance of a wireless multihop network is largely unknown, because of the interconnections between several factors involved. Customarily, th...
Min Xie, Martin Haenggi, Kai-Kit Wong