Sciweavers

1140 search results - page 72 / 228
» A Purpose-Based Access Control Model
Sort
View
143
Voted
ICC
2009
IEEE
149views Communications» more  ICC 2009»
15 years 1 months ago
Adoption of Cognitive Radio Scheme to Class-Based Call Admission Control
Abstract--By using cognitive radio technology, opportunistic spectrum access has the potential to solve the underused spectrum problem. In this paper, we employ class-based call ad...
Dongyue Xue, Hui Yu, Xinbing Wang, Hsiao-Hwa Chen
WICOMM
2011
14 years 11 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
146
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
183
Voted
APWEB
2011
Springer
14 years 7 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
WCNC
2010
IEEE
15 years 2 months ago
Interference Modeling for Cognitive Radio Networks with Power or Contention Control
—In this paper, we present an interference model for cognitive radio (CR) networks employing power control or contention control scheme. The probability density functions (PDFs) ...
Zengmao Chen, Cheng-Xiang Wang, Xuemin Hong, John ...