Sciweavers

807 search results - page 61 / 162
» Term Rewriting for Access Control
Sort
View
95
Voted
CORR
2010
Springer
57views Education» more  CORR 2010»
15 years 3 months ago
A Repeated Game Formulation of Energy-Efficient Decentralized Power Control
Decentralized multiple access channels where each transmitter wants to selfishly maximize his transmission energyefficiency are considered. Transmitters are assumed to choose freel...
Mael Le Treust, Samson Lasaulce
99
Voted
CHI
2010
ACM
15 years 10 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
134
Voted
CCS
2008
ACM
15 years 5 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
137
Voted
CODES
2007
IEEE
15 years 10 months ago
Predator: a predictable SDRAM memory controller
Memory requirements of intellectual property components (IP) in contemporary multi-processor systems-on-chip are increasing. Large high-speed external memories, such as DDR2 SDRAM...
Benny Akesson, Kees Goossens, Markus Ringhofer
151
Voted
CODES
2011
IEEE
14 years 3 months ago
Memory controllers for high-performance and real-time MPSoCs: requirements, architectures, and future trends
Designing memory controllers for complex real-time and highperformance multi-processor systems-on-chip is challenging, since sufficient capacity and (real-time) performance must b...
Benny Akesson, Po-Chun Huang, Fabien Clermidy, Den...