Sciweavers

231 search results - page 13 / 47
» Working set-based access control for network file systems
Sort
View
AINA
2004
IEEE
14 years 10 days ago
An Overlay Network Architecture for Data Placement Strategies in a P2P Streaming Network
Abstract--Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them ...
Kan Hung Wan, Chris Loeser
ECIS
2000
13 years 10 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
STORAGESS
2005
ACM
14 years 2 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
JSAC
2011
167views more  JSAC 2011»
13 years 3 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
ETFA
2005
IEEE
14 years 2 months ago
Environmental control system based on mobile devices
AbstractThe impact of the use of mobile devices by means of GPRS (General Packet Radio Service) technology to access environmental information in real time, provided by sensors str...
T. Albero, V. Sempere, J. Silvestre, P. Dabbas