Sciweavers

1477 search results - page 9 / 296
» Token flow control
Sort
View
TMC
2008
134views more  TMC 2008»
13 years 9 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
TRUST
2010
Springer
14 years 2 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
GLOBECOM
2007
IEEE
14 years 4 months ago
On the Level of Guaranteed Services for Signaling Control in Cellular Networks
— In this paper, we discuss our preliminary work on signaling overload control for cellular services which requires adaptability and scalability as well as guaranteed level of se...
Saowaphak Sasanus, David Tipper
ESOP
1999
Springer
14 years 2 months ago
Interprocedural Control Flow Analysis
Control Flow Analysis is a widely used approach for analysing functional and object oriented programs. Once the applications become more demanding also the analysis needs to be mor...
Flemming Nielson, Hanne Riis Nielson
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
13 years 10 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...