Sciweavers

807 search results - page 64 / 162
» Term Rewriting for Access Control
Sort
View
159
Voted
MSWIM
2005
ACM
15 years 9 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
124
Voted
IMC
2004
ACM
15 years 9 months ago
On the responsiveness of DNS-based network control
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balacha...
WISA
2009
Springer
15 years 10 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
CCS
2008
ACM
15 years 5 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
152
Voted
IJSNET
2007
115views more  IJSNET 2007»
15 years 3 months ago
Implementation and performance evaluation of nanoMAC: a low-power MAC solution for high density wireless sensor networks
: This paper describes the implementation architecture and performance analysis of nanoMAC, a CSMA/CA based medium access control protocol, which is specifically designed for high...
Junaid Ansari, Janne Riihijärvi, Petri Mä...