Sciweavers

360 search results - page 26 / 72
» The design of integrating subliminal channel with access con...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
IEEESCC
2007
IEEE
14 years 2 months ago
Composing Integrated Systems Using GUI-Based Applications And Web Services
— Integrated systems are composed of components that exchange information (i.e., interoperate [5]). These components include Graphical User Interface (GUI) APplications (GAPs) an...
Mark Grechanik, Kevin M. Conroy
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim
WAIM
2005
Springer
14 years 1 months ago
Integrative Security Management for Web-Based Enterprise Applications
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...
INFOCOM
2012
IEEE
11 years 10 months ago
Maximizing throughput when achieving time fairness in multi-rate wireless LANs
Abstract—This paper focuses on designing a distributed medium access control algorithm that aims at achieving time fairness among contending stations and throughput maximization ...
Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao ...