Sciweavers

243 search results - page 39 / 49
» A flexible access control mechanism for CAD frameworks
Sort
View
IJSNET
2006
145views more  IJSNET 2006»
14 years 11 months ago
RL-MAC: a reinforcement learning based MAC protocol for wireless sensor networks
:This paper introduces RL-MAC, a novel adaptive MediaAccess Control (MAC) protocol for Wireless Sensor Networks (WSN) that employs a reinforcement learning framework. Existing sche...
Zhenzhen Liu, Itamar Elhanany
CIDR
2009
167views Algorithms» more  CIDR 2009»
15 years 25 days ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
CCS
2009
ACM
16 years 10 days ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
75
Voted
ICSE
2007
IEEE-ACM
15 years 11 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
CVIU
2008
203views more  CVIU 2008»
14 years 11 months ago
A computer vision model for visual-object-based attention and eye movements
This paper presents a new computational framework for modelling visual-object based attention and attention-driven eye movements within an integrated system in a biologically insp...
Yaoru Sun, Robert B. Fisher, Fang Wang, Herman Mar...