Sciweavers

1462 search results - page 241 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
GLOBECOM
2006
IEEE
15 years 5 months ago
Collision Model for Bit Error Rate analysis of Time Hopping Impulse Radio in Multipath Nakagami-m Channels
— In presence of multiple access interference, the performance of impulse radio system is affected by collisions with other users. In this paper we evaluate the bit error probabi...
L. Reggiani, Umberto Spagnolini
SAC
2008
ACM
14 years 11 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SIGMETRICS
2000
ACM
153views Hardware» more  SIGMETRICS 2000»
15 years 4 months ago
Measurement and analysis of LDAP performance
The Lightweight Directory Access Protocol (LDAP) is being used for an increasing number of distributed directory applications. We describe a tool to analyze the performance of LDA...
Xin Wang, Henning Schulzrinne, Dilip D. Kandlur, D...
APLAS
2009
ACM
15 years 6 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 12 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi