Sciweavers

229 search results - page 19 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
TWC
2008
99views more  TWC 2008»
13 years 7 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 9 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
NDSS
2009
IEEE
14 years 2 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
PETRA
2009
ACM
14 years 2 months ago
Automatic sensor placement in a 3D volume
Given a 3D environment, a set of constraints, and a set of sensor models, this paper addresses the problem of finding the set of sensors and their corresponding placement that cov...
Eric Becker, Gutemberg Guerra-Filho, Fillia Makedo...
IJLIT
2010
67views more  IJLIT 2010»
13 years 6 months ago
Interoperability-Centric Problems: New Challenges and Legal Solutions
Whereas abandonment of detailed regulation is widely asserted to be the true way along with the fluctuations of the business models and emergence of IP-based services, there are s...
Turgut Ayhan Beydogan