Sciweavers

1927 search results - page 72 / 386
» An Access Control Model for Location based Services
Sort
View
ICC
2009
IEEE
129views Communications» more  ICC 2009»
15 years 4 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
PERCOM
2005
ACM
15 years 9 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
JCS
2010
124views more  JCS 2010»
14 years 8 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
QSHINE
2005
IEEE
15 years 3 months ago
Enhancing the IEEE 802.11e in QoS Support: Analysis and Mechanisms
Despite its support of prioritized services, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) cannot guarantee strict QoS required by real-time services such as voice a...
Xiang Chen, Hongqiang Zhai, Yuguang Fang
DAC
2006
ACM
15 years 11 months ago
Leakage power reduction of embedded memories on FPGAs through location assignment
Transistor leakage is poised to become the dominant source of power dissipation in digital systems, and reconfigurable devices are not immune to this problem. Modern FPGAs already...
Yan Meng, Timothy Sherwood, Ryan Kastner