Sciweavers

3320 search results - page 75 / 664
» Accessibility of the Database Literature
Sort
View
ICC
2007
IEEE
110views Communications» more  ICC 2007»
15 years 5 months ago
Performance of Interleave Division Multiple Access Based on Minimum Mean Square Error Detection
— Interleave division multiple access (IDMA) recently attracted many research activities because of its excellent performance despite its reasonable low complexity. The low compl...
Katsutoshi Kusume, Guido Dietl, Wolfgang Utschick,...
LCN
2007
IEEE
15 years 5 months ago
A Novel MIMO-Aware Distributed Media Access Control Scheme for IEEE 802.11 Wireless Local Area Networks
—This paper proposes a new distributed media access control (MAC) scheme to improve the network performance of Multiple-Input Multiple-Output (MIMO) wireless systems. In particul...
Dan J. Dechene, Khalim Amjad Meerja, Abdallah Sham...
CSFW
2006
IEEE
15 years 5 months ago
On Key Assignment for Hierarchical Access Control
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key ...
Jason Crampton, Keith M. Martin, Peter R. Wild
TKDE
2008
177views more  TKDE 2008»
14 years 11 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ICDE
2001
IEEE
113views Database» more  ICDE 2001»
16 years 20 days ago
Measuring and Optimizing a System for Persistent Database Sessions
High availability for both data and applications is rapidly becoming a business requirement. While database systems support recovery, providing high database availability, applica...
Roger S. Barga, David B. Lomet