Sciweavers

26 search results - page 4 / 6
» Role-Based access control consistency validation
Sort
View
NETWORKING
2007
13 years 9 months ago
Performance and Equilibrium Analysis of Heterogeneous IEEE 802.11 Based WLANs
This paper presents a general model to study the medium access control (MAC) layer performance and equilibrium of WLANs consisting of nodes with different MAC parameters (e.g., ba...
Hao Zhu
MMMACNS
2001
Springer
14 years 5 days ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
GPCE
2008
Springer
13 years 8 months ago
Property models: from incidental algorithms to reusable components
A user interface, such as a dialog, assists a user in synthesising a set of values, typically parameters for a command object. Code for “command parameter synthesis” is usuall...
Jaakko Järvi, Mat Marcus, Sean Parent, John F...
FTDCS
2003
IEEE
14 years 1 months ago
Autonomous Transaction Processing Using Data Dependency in Mobile Environments
Mobile clients retrieve and update databases at servers. They use transactions in order to ensure the consistency of shared data in the presence of concurrent accesses. Transactio...
IlYoung Chung, Bharat K. Bhargava, Malika Mahoui, ...
ISCA
2007
IEEE
174views Hardware» more  ISCA 2007»
14 years 2 months ago
An integrated hardware-software approach to flexible transactional memory
There has been considerable recent interest in the support of transactional memory (TM) in both hardware and software. We present an intermediate approach, in which hardware is us...
Arrvindh Shriraman, Michael F. Spear, Hemayet Hoss...