Sciweavers

1472 search results - page 268 / 295
» Access control in virtual environments
Sort
View
MOBIHOC
2004
ACM
15 years 5 months ago
Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standar...
Jungmin So, Nitin H. Vaidya
SIGUCCS
2004
ACM
15 years 5 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 5 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
ISI
2004
Springer
15 years 5 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
HICSS
2003
IEEE
178views Biometrics» more  HICSS 2003»
15 years 5 months ago
A Contract and Rights Management Framework Design for Interacting Brokers
Contract and rights management – and thus property rights protection – has gained increasing importance as a quality standard in brokerage and electronic commerce environments...
Susanne Guth, Bernd Simon, Uwe Zdun