Sciweavers

3712 search results - page 624 / 743
» Role-Based Access Control
Sort
View
CN
2006
161views more  CN 2006»
13 years 9 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami
CN
2006
145views more  CN 2006»
13 years 9 months ago
Understanding optimal data gathering in the energy and latency domains of a wireless sensor network
The problem of optimal data gathering in wireless sensor networks (WSNs) is addressed by means of optimization techniques. The goal of this work is to lay the foundations to devel...
Ugo Monaco, Francesca Cuomo, Tommaso Melodia, Fabi...
CONCURRENCY
2006
111views more  CONCURRENCY 2006»
13 years 9 months ago
ScyFlow: an environment for the visual specification and execution of scientific workflows
With the advent of grid technologies, scientists and engineers are building more and more complex applications to utilize distributed grid resources. The core grid services provid...
Karen M. McCann, Maurice Yarrow, Adrian De Vivo, P...
IJSNET
2008
94views more  IJSNET 2008»
13 years 9 months ago
Connection data rate optimisation of IEEE 802.15.3 scatternets with multirate carriers
: Designed for high rate Wireless Personal Area Networks (WPANs), the IEEE 802.15.3 Medium Access Control (MAC) protocol supports peer-to-peer communications in a piconet. In this ...
Zhanping Yin, Victor C. M. Leung
IJISEC
2006
113views more  IJISEC 2006»
13 years 9 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...