Sciweavers

807 search results - page 110 / 162
» Term Rewriting for Access Control
Sort
View
LCTRTS
2007
Springer
15 years 9 months ago
External memory page remapping for embedded multimedia systems
As memory speeds and bus capacitances continue to rise, external memory bus power will make up an increasing portion of the total system power budget for system-on-a-chip embedded...
Ke Ning, David R. Kaeli
125
Voted
MOBICOM
2006
ACM
15 years 9 months ago
IQU: practical queue-based user association management for WLANs
Flash crowds and high concentrations of users in wireless LANs (WLANs) cause significant interference problems and unsustainable load at access points. This leads to poor connect...
Amit P. Jardosh, Kimaya Mittal, Krishna N. Ramacha...
141
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
CCS
2008
ACM
15 years 5 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
JSAC
2008
157views more  JSAC 2008»
15 years 3 months ago
Spectrum Leasing to Cooperating Secondary Ad Hoc Networks
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...