Sciweavers

1927 search results - page 286 / 386
» An Access Control Model for Location based Services
Sort
View
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
15 years 8 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
WINET
2010
98views more  WINET 2010»
14 years 12 months ago
A mobility-based load control scheme in Hierarchical Mobile IPv6 networks
By introducing a mobility anchor point (MAP), Hierarchical Mobile IPv6 (HMIPv6) reduces the signaling overhead and handoff latency associated with Mobile IPv6. In this paper, we pr...
Sangheon Pack, Taekyoung Kwon, Yanghee Choi
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 6 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
LCN
2007
IEEE
15 years 7 months ago
Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks
Abstract—In this work, we discuss how to support Video-onDemand service in multi-hop WiMax mesh networks. We are interested in the scenario that end users connect to the video se...
Fei Xie, Kien A. Hua, Ning Jiang
CN
2004
95views more  CN 2004»
15 years 1 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...