Sciweavers

418 search results - page 2 / 84
» Controlling Access in Multiuser Interfaces
Sort
View
JSAC
2008
92views more  JSAC 2008»
13 years 5 months ago
Multiuser diversity with capture for wireless networks: protocol and performance analysis
Abstract--In a wireless network, with the aid of rate adaptation, multiuser diversity can be exploited by allowing the mobile user with the best channel to use the channel. However...
Justin Foo, Defeng Huang
XSYM
2004
Springer
161views Database» more  XSYM 2004»
13 years 10 months ago
Adjustable Transaction Isolation in XML Database Management Systems
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...
Michael Peter Haustein, Theo Härder
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 6 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
CORR
2010
Springer
120views Education» more  CORR 2010»
13 years 5 months ago
How Much Multiuser Diversity is Required for Energy Limited Multiuser Systems?
Multiuser diversity (MUDiv) is one of the central concepts in multiuser (MU) systems. In particular, MUDiv allows for scheduling among users in order to eliminate the negative effe...
Youngwook Ko, Sergiy A. Vorobyov, Masoud Ardakani
STORAGESS
2005
ACM
13 years 10 months ago
Key management for multi-user encrypted databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...