Sciweavers

807 search results - page 92 / 162
» Term Rewriting for Access Control
Sort
View
117
Voted
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 3 months ago
Utility Constrained Energy Minimization In Aloha Networks
In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in t...
Amir Mahdi Khodaian, Babak Hossein Khalaj, Mohamma...
147
Voted
VTC
2010
IEEE
242views Communications» more  VTC 2010»
15 years 1 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
141
Voted
AINA
2009
IEEE
15 years 1 months ago
A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor Networks
In this paper, a CDMA-based medium access control (MAC) scheme in underwater acoustic sensor networks is proposed, in which a periodic sleeping mode is jointly employed for the pu...
Jong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon S...
126
Voted
CCS
2006
ACM
15 years 7 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
132
Voted
ICADL
2003
Springer
117views Education» more  ICADL 2003»
15 years 8 months ago
Metadata++: A Scalable Hierarchical Framework for Digital Libraries
: Metadata++ is a digital library system that we are developing to serve the needs of the United States Department of Agriculture Forest Service, the United States Department of th...
Mathew Weaver, Lois M. L. Delcambre, Timothy Tolle