Sciweavers

3712 search results - page 655 / 743
» Role-Based Access Control
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
13 years 10 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
USENIX
1994
13 years 10 months ago
Acme: A User Interface for Programmers
A hybrid of window system, shell, and editor, Acme gives text-oriented applications a clean, expressive, and consistent style of interaction. Traditional window systems support in...
Rob Pike
WSC
1994
13 years 10 months ago
General purpose simulation with stroboscope
Stroboscope is a programming language designed for the simulation of processes common to construction engineering. These processes are very complex and involve many different type...
Julio C. Martínez, Photios G. Ioannou
WCE
2007
13 years 10 months ago
A Proactive Horizontal Handover Algorithm for WiFi-WiMax Interoperable Networks
— Two important high bandwidth wireless certifications in our days are Worldwide Interoperability for Microwave Access (WiMax) and Wireless Fidelity (WiFi). They can interoperate...
Álvaro Suárez Sarmiento, Kholoud Elb...
MOBICOM
2010
ACM
13 years 9 months ago
Fair WLAN backhaul aggregation
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...