Sciweavers

602 search results - page 102 / 121
» An access control model for mobile physical objects
Sort
View
127
Voted
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 1 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
ACSAC
2008
IEEE
15 years 8 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
107
Voted
COOPIS
2003
IEEE
15 years 7 months ago
Implementation Experience with OMG's SCIOP Mapping
Longevity of distributed computing middleware standards, such as CORBA, depend on their ability to support a range of applications by providing low overhead access in a uniform man...
Gautam H. Thaker, Patrick J. Lardieri, Chuck Winte...
INFOCOM
2009
IEEE
15 years 8 months ago
Proportional Fair Frequency-Domain Packet Scheduling for 3GPP LTE Uplink
—With the power consumption issue of mobile handset taken into account, Single-carrier FDMA (SC-FDMA) has been selected for 3GPP Long-Term Evolution (LTE) uplink multiple access ...
Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, S...
MOBICOM
2005
ACM
15 years 7 months ago
An analytical model for the dimensioning of a GPRS/EDGE network with a capacity constraint on a group of cells
This paper is a contribution to the generic problem of having simple and accurate models to dimension radio cells with data traffic on a GPRS or EDGE network. It addresses the iss...
Georges Nogueira, Bruno Baynat, Pierre Eisenmann