Sciweavers

1611 search results - page 26 / 323
» An Access Control Model for Video Database Systems
Sort
View
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
15 years 3 months ago
TCP Congestion Window Controlling Algorithms on iSCSI Sequential Read Access
iSCSI is one of the most promising technologies in IPSAN, which decreases a storage management cost. Congestion Window, one of TCP parameters, has a close relationship with system...
Machiko Toyoda, Masato Oguchi, Saneyasu Yamaguchi
ICPPW
2003
IEEE
15 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
ITRUST
2005
Springer
15 years 3 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
TIP
2008
85views more  TIP 2008»
14 years 9 months ago
Resource Allocation for Error Resilient Video Coding Over AWGN Using Optimization Approach
The number of slices for error resilient video coding is jointly optimized with 802.11a-like media access control and the physical layers with automatic repeat request and rate com...
Cheolhong An, Truong Q. Nguyen
SUTC
2006
IEEE
15 years 3 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo