Sciweavers

15254 search results - page 3019 / 3051
» A k
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
14 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
76
Voted
TIT
2010
111views Education» more  TIT 2010»
14 years 4 months ago
Designing floating codes for expected performance
Floating codes are codes designed to store multiple values in a Write Asymmetric Memory, with applications to flash memory. In this model, a memory consists of a block of n cells, ...
Flavio Chierichetti, Hilary Finucane, Zhenming Liu...
TON
2010
93views more  TON 2010»
14 years 4 months ago
On the Validity of IEEE 802.11 MAC Modeling Hypotheses
We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packe...
K. D. Huang, Ken R. Duffy, David Malone
TON
2010
138views more  TON 2010»
14 years 4 months ago
SUSE: superior storage-efficiency for routing tables through prefix transformation and aggregation
Abstract--A novel storage design for IP routing table construction is introduced on the basis of a single set-associative hash table to support fast longest prefix matching (LPM). ...
Fong Pong, Nian-Feng Tzeng
TSP
2010
14 years 4 months ago
Mitigating channel estimation error with timing synchronization tradeoff in cooperative communications
Channel estimation error and co-channel interference (CCI) problems are among the main causes of performance degradation in wireless networks. In this paper, we investigate the im...
Ahmed S. Ibrahim, K. J. Ray Liu
« Prev « First page 3019 / 3051 Last » Next »