Sciweavers

316 search results - page 50 / 64
» Variations in Access Control Logic
Sort
View
SIGMOD
2005
ACM
74views Database» more  SIGMOD 2005»
14 years 7 months ago
Online B-tree Merging
Many scenarios involve merging of two B-tree indexes, both covering the same key range. Increasing demand for continuous availability and high performance requires that such mergi...
Xiaowei Sun, Rui Wang 0002, Betty Salzberg, Chendo...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
14 years 1 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
RTSS
2006
IEEE
14 years 1 months ago
System-Level Energy Management for Periodic Real-Time Tasks
In this paper, we consider the system-wide energy management problem for a set of periodic real-time tasks running on a DVS-enabled processor. Our solution uses a generalized powe...
Hakan Aydin, Vinay Devadas, Dakai Zhu
IPSN
2003
Springer
14 years 23 days ago
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
Abstract. We demonstrate that it is possible to achieve accurate localization and tracking of a target in a randomly placed wireless sensor network composed of inexpensive componen...
Radhika Nagpal, Howard E. Shrobe, Jonathan Bachrac...
PODS
1999
ACM
95views Database» more  PODS 1999»
13 years 12 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...