Sciweavers

1927 search results - page 303 / 386
» An Access Control Model for Location based Services
Sort
View
MSN
2005
Springer
179views Sensor Networks» more  MSN 2005»
15 years 7 months ago
Coverage Analysis for Wireless Sensor Networks
The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of...
Ming Liu, Jiannong Cao, Wei Lou, Lijun Chen 0006, ...
112
Voted
USENIX
2007
15 years 3 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
TSMC
2008
162views more  TSMC 2008»
15 years 1 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino
AICT
2006
IEEE
126views Communications» more  AICT 2006»
15 years 7 months ago
A Framework to Add AAA Functionalities in IP Multicast
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of the advantages of its lower resource utilization and bandwidth conservation. This is d...
Salekul Islam, J. William Atwood
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
15 years 6 months ago
Distributed and optimal reduced primal-dual algorithm for uplink OFDM resource allocation
— Orthogonal frequency division multiplexing (OFDM) is the key component of many emerging broadband wireless access standards. The resource allocation in OFDM uplink, however, is...
Xiao-Xin Zhang, Liang Chen, Jianwei Huang, Minghua...