— Interleave division multiple access (IDMA) recently attracted many research activities because of its excellent performance despite its reasonable low complexity. The low compl...
Katsutoshi Kusume, Guido Dietl, Wolfgang Utschick,...
—This paper proposes a new distributed media access control (MAC) scheme to improve the network performance of Multiple-Input Multiple-Output (MIMO) wireless systems. In particul...
Dan J. Dechene, Khalim Amjad Meerja, Abdallah Sham...
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key ...
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
High availability for both data and applications is rapidly becoming a business requirement. While database systems support recovery, providing high database availability, applica...