Sciweavers

360 search results - page 31 / 72
» The design of integrating subliminal channel with access con...
Sort
View
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
13 years 7 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
PEWASUN
2005
ACM
14 years 1 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
ISCA
2010
IEEE
214views Hardware» more  ISCA 2010»
14 years 24 days ago
Re-architecting DRAM memory systems with monolithically integrated silicon photonics
The performance of future manycore processors will only scale with the number of integrated cores if there is a corresponding increase in memory bandwidth. Projected scaling of el...
Scott Beamer, Chen Sun, Yong-Jin Kwon, Ajay Joshi,...
AEI
2005
102views more  AEI 2005»
13 years 7 months ago
Manufacturing planning and predictive process model integration using software agents
Intelligent agents provide a means to integrate various manufacturing software applications. The agents are typically executed in a computer-based collaborative environment, refer...
Shaw C. Feng, Keith A. Stouffer, Kevin K. Jurrens
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi