Sciweavers

2024 search results - page 273 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
144
Voted
INFORMATICALT
2010
122views more  INFORMATICALT 2010»
15 years 1 months ago
On a Time-Varying Parameter Adaptive Self-Organizing System in the Presence of Large Outliers in Observations
In the previous papers (Pupeikis, 2000; Genov et al., 2006; Atanasov and Pupeikis, 2009), a direct approach for estimating the parameters of a discrete-time linear time-invariant (...
Rimantas Pupeikis
127
Voted
ACSC
2006
IEEE
15 years 9 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
NETWORKING
2000
15 years 4 months ago
Efficient Network Utilization for Multimedia Wireless Networks
In this paper, we present an access scheme to satisfy the QoS requirements for two classes of traffic during the contention phase of packet-switched wireless communications. In the...
Xin Liu, Edwin K. P. Chong, Ness B. Shroff
140
Voted
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
15 years 8 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
128
Voted
ASPDAC
1995
ACM
103views Hardware» more  ASPDAC 1995»
15 years 7 months ago
A scheduling algorithm for multiport memory minimization in datapath synthesis
- In this paper, we present a new scheduling algorithms that generates area-efficient register transfer level datapaths with multiport memories. The proposed scheduling algorithm a...
Hae-Dong Lee, Sun-Young Hwang