Sciweavers

16626 search results - page 3320 / 3326
» Computing is a natural science
Sort
View
INFOCOM
2011
IEEE
14 years 5 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
CODASPY
2011
14 years 5 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
FAST
2011
14 years 4 months ago
FAST: Quick Application Launch on Solid-State Drives
Application launch performance is of great importance to system platform developers and vendors as it greatly affects the degree of users’ satisfaction. The single most effectiv...
Yongsoo Joo, Junhee Ryu, Sangsoo Park, Kang G. Shi...
INFOCOM
2011
IEEE
14 years 4 months ago
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets
Abstract—Secondary spectrum access is emerging as a promising approach for mitigating the spectrum scarcity in wireless networks. Coordinated spectrum access for secondary users ...
Ajay Gopinathan, Zongpeng Li, Chuan Wu
INFOCOM
2011
IEEE
14 years 4 months ago
A prior-free revenue maximizing auction for secondary spectrum access
—Dynamic spectrum allocation has proven promising for mitigating the spectrum scarcity problem. In this model, primary users lease chunks of under-utilized spectrum to secondary ...
Ajay Gopinathan, Zongpeng Li
« Prev « First page 3320 / 3326 Last » Next »