Sciweavers

360 search results - page 44 / 72
» The design of integrating subliminal channel with access con...
Sort
View
IAJIT
2010
133views more  IAJIT 2010»
13 years 6 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
GLOBECOM
2009
IEEE
14 years 2 months ago
On Analyzing the Capacity of WDM PONs
—By taking advantage of the multiple wavelength provisioning capability, WDM PON dramatically enlarges its capacity as compared to TDM PON. The capacity of a WDM PON system depen...
Jingjing Zhang, Nirwan Ansari
AINA
2009
IEEE
13 years 5 months ago
A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor Networks
In this paper, a CDMA-based medium access control (MAC) scheme in underwater acoustic sensor networks is proposed, in which a periodic sleeping mode is jointly employed for the pu...
Jong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon S...
CF
2006
ACM
13 years 11 months ago
An efficient cache design for scalable glueless shared-memory multiprocessors
Traditionally, cache coherence in large-scale shared-memory multiprocessors has been ensured by means of a distributed directory structure stored in main memory. In this way, the ...
Alberto Ros, Manuel E. Acacio, José M. Garc...
CCS
2005
ACM
14 years 1 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough