Sciweavers

798 search results - page 22 / 160
» Comparing the expressive power of access control models
Sort
View
SENSYS
2004
ACM
15 years 3 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
WIKIS
2010
ACM
15 years 1 months ago
Deep hypertext with embedded revision control implemented in regular expressions
While text versioning was definitely a part of the original hypertext concept [21, 36, 44], it is rarely considered in this context today. Still, we know that revision control un...
Victor S. Grishchenko
CCS
2009
ACM
15 years 10 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
79
Voted
VTC
2007
IEEE
15 years 4 months ago
A Power-Controlled 2-Dimensional Block Spread DS-CDMA Cellular System with Uplink Site Selection Diversity
—2-dimensional (2D) block spread direct sequence-code division multiple access (DS-CDMA) allows uplink mutlirate/mutli-connection transmissions without causing a serious multi-ac...
Le Liu, Fumiyuki Adachi
62
Voted
ECEASST
2008
106views more  ECEASST 2008»
14 years 9 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan