Sciweavers

1472 search results - page 271 / 295
» Access control in virtual environments
Sort
View
USS
2004
15 years 1 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
HPN
1992
15 years 29 days ago
A Host Interface Architecture for High-Speed Networks
This paper describes a new host interface architecture for high-speed networks operating at 800 of Mbit/second or higher rates. The architecture is targeted to achieve several 100...
Peter Steenkiste, Brian Zill, H. T. Kung, Steven S...
HPDC
2010
IEEE
15 years 27 days ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
CORR
2007
Springer
120views Education» more  CORR 2007»
14 years 11 months ago
Distributed Fair Scheduling Using Variable Transmission Lengths in Carrier-Sensing-based Wireless Networks
— The fairness of IEEE 802.11 wireless networks (including Wireless LAN and Ad-hoc networks) is hard to predict and control because of the randomness and complexity of the MAC co...
Libin Jiang, Jean C. Walrand
JCM
2007
191views more  JCM 2007»
14 years 11 months ago
Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results
- Wireless Local Area Networking standard (Wi-Fi) and the WPAN standard (Bluetooth and Zigbee) products utilize the same unlicensed 2.4 GHz ISM band. Co-existence between such wire...
Khaled Shuaib, Maryam Alnuaimi, Mohammed Boulmalf,...