Sciweavers

1195 search results - page 34 / 239
» What, Where
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
CSFW
2009
IEEE
14 years 2 months ago
Tight Enforcement of Information-Release Policies for Dynamic Languages
This paper studies the problem of securing information release in dynamic languages. We propose (i) an intuitive framework for information-release policies expressing both what ca...
Aslan Askarov, Andrei Sabelfeld
CONEXT
2009
ACM
13 years 8 months ago
Networking named content
Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and se...
Van Jacobson, Diana K. Smetters, James D. Thornton...
WSC
2008
13 years 10 months ago
Embedding human scheduling in a steel plant simulation
A simulation was commissioned to understand the interactions that constrain the capacity of a steel plant. The aim was for this to become a reusable tool that could evaluate the e...
David Briggs
MST
2010
93views more  MST 2010»
13 years 6 months ago
Atomic Congestion Games: Fast, Myopic and Concurrent
We study here the effect of concurrent greedy moves of players in atomic congestion games where n selfish agents (players) wish to select a resource each (out of m resources) so ...
Dimitris Fotakis, Alexis C. Kaporis, Paul G. Spira...