Sciweavers

807 search results - page 102 / 162
» Term Rewriting for Access Control
Sort
View
132
Voted
ECRTS
2007
IEEE
15 years 9 months ago
On Scheduling and Real-Time Capacity of Hexagonal Wireless Sensor Networks
Since wireless ad-hoc networks use shared communication medium, accesses to the medium must be coordinated to avoid packet collisions. Transmission scheduling algorithms allocate ...
Shashi Prabh, Tarek F. Abdelzaher
132
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
SOUPS
2010
ACM
15 years 3 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
135
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 10 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
ASSETS
2006
ACM
15 years 9 months ago
VoxBoox: : a system for automatic generation of interactive talking books
The VoxBoox system makes digital books accessible to visually impaired individuals via audio and voice. It automatically translates a book published in HTML to VoiceXML, and then ...
Aanchal Jain, Gopal Gupta