Sciweavers

807 search results - page 81 / 162
» Term Rewriting for Access Control
Sort
View
208
Voted
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 3 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
125
Voted
MOBIHOC
2004
ACM
16 years 3 months ago
A unified MAC layer framework for ad-hoc networks with smart antennas
Smart antennas represent a broad variety of antennas that differ in their performance and transceiver complexity. The superior capabilities of smart antennas, however, can be leve...
Karthikeyan Sundaresan, Raghupathy Sivakumar
CCS
2009
ACM
15 years 10 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
119
Voted
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
15 years 9 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
ICN
2001
Springer
15 years 8 months ago
Improving Fairness and Throughput in Multi-Hop Wireless Networks
In this paper we study the impact of the medium access control (MAC) layer and the routing layer on the performance of a multi-hop wireless network. At the medium access control la...
Hung-Yun Hsieh, Raghupathy Sivakumar