Sciweavers

1587 search results - page 80 / 318
» Access Control for Shared Resources
Sort
View
108
Voted
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
82
Voted
ICC
2000
IEEE
102views Communications» more  ICC 2000»
15 years 5 months ago
Multiple Access Techniques for Wideband Upstream Powerline Communications: CAP-CDMA and DMT-FDMA
This paper compares two multiuser transmission techniques in the context of wideband upstream powerline communications. The first one is based on the combination of CAP and CDMA,...
Thierry Sartenaer, François Horlin, Luc Van...
102
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
Advanced Multicast and Broadcast Content Distribution in Mobile Cellular Networks
—Recently 3GPP (Third Generation Partnership Project) has standardised MBMS (Multimedia Broadcast Multicast Services) enabling broadcast and multicast transmissions over GPRS (Ge...
Michael Knappmeyer, Björn Ricks, Ralf Tö...
71
Voted
NSDI
2008
15 years 2 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
KIVS
2001
Springer
15 years 5 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp