Sciweavers

1109 search results - page 158 / 222
» Decentralized access control in distributed file systems
Sort
View
JCS
2008
69views more  JCS 2008»
15 years 1 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 2 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
ATAL
2004
Springer
15 years 7 months ago
Resource Allocation in the Grid Using Reinforcement Learning
One of the main challenges in Grid computing is efficient allocation of resources (CPU-hours, network bandwidth, etc.) to the tasks submitted by users. Due to the lack of centrali...
Aram Galstyan, Karl Czajkowski, Kristina Lerman
168
Voted
IWRT
2010
178views Communications» more  IWRT 2010»
14 years 11 months ago
CSMA Multi-stage Anti-collision Protocol for Active RFID Systems
Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. How...
Alejandro Palomo-López, M. Victoria Bueno-D...
ENTCS
2008
130views more  ENTCS 2008»
15 years 1 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...