Sciweavers

2172 search results - page 302 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
IMC
2010
ACM
15 years 3 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
GLOBECOM
2009
IEEE
15 years 11 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
130
Voted
RAID
1999
Springer
15 years 9 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
130
Voted
HT
1996
ACM
15 years 9 months ago
The HyperDisco Approach to Open Hypermedia Systems
Computing support forlargeengineeringenterprisesprovides an example of the need for hypermedia-based collaborative computing systems composed of a large number of distributed hete...
Uffe Kock Wiil, John J. Leggett
123
Voted
IJOE
2008
98views more  IJOE 2008»
15 years 5 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg