Sciweavers

303 search results - page 23 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
ICC
2008
IEEE
161views Communications» more  ICC 2008»
15 years 11 months ago
Joint Power Control and Link Scheduling in Wireless Networks for Throughput Optimization
—This paper concerns the problem of finding the minimum-length TDMA frame of a power-controlled wireless network subject to traffic demands and SINR (signalto-interference-plus...
Liqun Fu, Soung Chang Liew, Jianwei Huang
CSFW
2004
IEEE
15 years 8 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
SACMAT
2003
ACM
15 years 10 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 11 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer
DBPL
2003
Springer
120views Database» more  DBPL 2003»
15 years 10 months ago
A Unifying Semantics for Active Databases Using Non-Markovian Theories of Actions
Over the last fifteen years, database management systems (DBMSs) have been enhanced by the addition of rule-based programming to obtain active DBMSs. One of the greatest challeng...
Iluju Kiringa, Raymond Reiter