Sciweavers

1472 search results - page 270 / 295
» Access control in virtual environments
Sort
View
65
Voted
CSE
2009
IEEE
15 years 3 months ago
A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC
A Distributed Medium Access Control (D-MAC) protocol has been proposed to support high-rate Wireless Personal Area Networks (HR-WPANs) by the WiMedia Alliance. The WiMedia D-MAC s...
Jin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop ...
IMC
2007
ACM
15 years 1 months ago
Studying wireless routing link metric dynamics
Multi-hop wireless mesh networks are increasingly being deployed for last-mile Internet access. Typically, network algorithms such as routing, channel assignment and topology cont...
Saumitra M. Das, Himabindu Pucha, Konstantina Papa...
IICAI
2007
15 years 1 months ago
Extractive Summarization in Clinical Trials Protocol Summaries: A Case Study
This paper presents a method for extracting purpose statements from clinical trial protocol summaries. Simple summarization technology based on regular expressions and natural lang...
Graciela Rosemblat, Laurel Graham, Tony Tse
AIPS
2003
15 years 1 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
ISSA
2004
15 years 1 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo