Sciweavers

653 search results - page 55 / 131
» Addressing interoperability issues in access control models
Sort
View
COMAD
2008
15 years 2 months ago
Exploiting Asynchronous IO using the Asynchronous Iterator Model
Asynchronous IO (AIO) allows a process to continue to do other work while an IO operation initiated earlier completes. AIO allows a large number of random IO operations to be issu...
Suresh Iyengar, S. Sudarshan, Santosh Kumar 0002, ...
113
Voted
MOBIHOC
2002
ACM
16 years 4 days ago
Priority scheduling in wireless ad hoc networks
Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and "hidden terminal" problem ma...
Xue Yang, Nitin H. Vaidya
WISTP
2010
Springer
14 years 10 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
15 years 5 months ago
An algorithm for estimating time-varying commodity price models
— Given the current financial crisis, there is renewed interest in modelling how the price of commodities change in the market. Traditionally, such models have assumed constant ...
Boris I. Godoy, Graham C. Goodwin, Juan C. Agü...
ESWS
2008
Springer
15 years 2 months ago
Entity Lifecycle Management for OKKAM
In this paper, we examine the special requirements of lifecycle management for entities in the context of an entity management system for the semantic web. We study the requirement...
Junaid Ahsenali Chaudhry, Themis Palpanas, Perikli...