Sciweavers

1587 search results - page 75 / 318
» Access Control for Shared Resources
Sort
View
96
Voted
ADHOC
2007
109views more  ADHOC 2007»
15 years 20 days ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
15 years 5 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
97
Voted
PPL
2007
86views more  PPL 2007»
15 years 1 days ago
Failure-Sensitive Analysis of Parallel Algorithms with Controlled Memory Access Concurrency
ract problem of using P failure-prone processors to cooperatively update all locations of an N-element shared array is called Write-All. Solutions to Write-All can be used iterati...
Chryssis Georgiou, Alexander Russell, Alexander A....
141
Voted
MOBICOM
2009
ACM
15 years 7 months ago
A quorum-based framework for establishing control channels in dynamic spectrum access networks
Establishing a control channel for medium access control is a challenging problem in multi-channel and dynamic spectrum access (DSA) networks. In the design of multi-channel MAC p...
Kaigui Bian, Jung Min Park, Ruiliang Chen
TIFS
2010
130views more  TIFS 2010»
14 years 7 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena