Sciweavers

621 search results - page 100 / 125
» An Expressive and Efficient Solution to the Service Selectio...
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WICOMM
2010
70views more  WICOMM 2010»
14 years 8 months ago
Distributed timeslot allocation with crossed slots in CDMA-TDD systems
Code division multiple access system with time division duplex (CDMA-TDD) is a promising solution to cope with traffic asymmetry of downlink and uplink in multimedia services. Whe...
Ki Won Sung, Chae Y. Lee
WISEC
2010
ACM
14 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
80
Voted
VLDB
2004
ACM
104views Database» more  VLDB 2004»
15 years 3 months ago
Remembrance of Streams Past: Overload-Sensitive Management of Archived Streams
This paper studies Data Stream Management Systems that combine real-time data streams with historical data, and hence access incoming streams and archived data simultaneously. A s...
Sirish Chandrasekaran, Michael J. Franklin
IEEEMSP
2002
IEEE
15 years 2 months ago
An optimal shape encoding scheme using skeleton decomposition
—This paper presents an operational rate-distortion (ORD) optimal approach for skeleton-based boundary encoding. The boundary information is first decomposed into skeleton and di...
Haohong Wang, Guido M. Schuster, Aggelos K. Katsag...