Sciweavers

828 search results - page 107 / 166
» Access Control in Location-Based Services
Sort
View
WPES
2003
ACM
15 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
ICNP
1998
IEEE
15 years 2 months ago
QGMA: A New MAC Protocol for Supporting QoS in Wireless Local Area Networks
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
Yi Ye, Chao-Ju Hou, Ching-Chih Han
MONET
2002
185views more  MONET 2002»
14 years 9 months ago
An Adaptive Generalized Transmission Protocol for Ad Hoc Networks
Wireless networking and group communication in combination allows groups of dispersed mobile users to collaborate. This paper presents AGENT, a medium access control (MAC) protocol...
Andrew D. Myers, Gergely V. Záruba, Violet ...
PC
1998
125views Management» more  PC 1998»
14 years 9 months ago
A High-Performance Active Digital Library
We describe Javaflow and Paraflow, the client and server parts of a digital library, providing high-performance data-retrieval and data-mining services, with emphasis on user in...
Roy Williams, Bruce Sears
NETWORK
2007
145views more  NETWORK 2007»
14 years 9 months ago
Analysis of Shared Memory Priority Queues with Two Discard Levels
— Two rate SLAs become increasingly popular in today’s Internet, allowing a customer to save money by paying one price for committed traffic and a much lower price for additio...
Shlomi Bergida, Yuval Shavitt