Sciweavers

1134 search results - page 59 / 227
» Distributed Proving in Access-Control Systems
Sort
View
ESCIENCE
2006
IEEE
15 years 9 months ago
FAME: Adding Multi-Level Authentication to Shibboleth
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...
VTC
2006
IEEE
109views Communications» more  VTC 2006»
15 years 9 months ago
Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput
— IEEE 802.11 WLAN has been widely accepted throughout the world. However, it has large overhead due to idle backoff slots and frequent collisions depending on the number of node...
Hojin Lee, Jaeyoung Choi, Taekyoung Kwon, Yanghee ...
IEEESP
2008
136views more  IEEESP 2008»
15 years 3 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
138
Voted
PEWASUN
2004
ACM
15 years 8 months ago
A modified IEEE 802.11 MAC protocol for MC-CDMA
In this paper, we introduce a modified version of the IEEE 802.11a protocol and evaluate its performance. The new protocol is a combination of the standard Medium Access Control (...
Georgios Orfanos, Jörg Habetha, Ling Liu
IPPS
2007
IEEE
15 years 9 months ago
Mobility of Data in Distributed Hybrid Computing Systems
In distributed hybrid computing systems, traditional sequential processors are loosely coupled with reconfigurable hardware for optimal performance. This loose coupling proves to...
Philippe Faes, Mark Christiaens, Dirk Stroobandt