Sciweavers

798 search results - page 143 / 160
» Comparing the expressive power of access control models
Sort
View
MOBICOM
2006
ACM
15 years 3 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
SI3D
2005
ACM
15 years 3 months ago
What you see is what you snap: snapping to geometry deformed on the GPU
We present a simple yet effective snapping technique for constraining the motion of the cursor of an input device to the surface of 3D models whose geometry is arbitrarily deforme...
Harlen Costa Batagelo, Shin-Ting Wu
JIIS
2008
104views more  JIIS 2008»
14 years 9 months ago
Transaction Management for Flash Media Databases in Portable Computing Environments
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Siwoo Byun
RTSS
2005
IEEE
15 years 3 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
FOCS
2006
IEEE
15 years 3 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...