Sciweavers

2655 search results - page 110 / 531
» Event Systems and Access Control
Sort
View
INFOCOM
2005
IEEE
15 years 10 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
JSAC
2011
167views more  JSAC 2011»
14 years 12 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
IRI
2005
IEEE
15 years 10 months ago
Towards administration of a hybrid role hierarchy
Role-Based Access Control (RBAC) models have emerged as a leading access control approach for today’s information systems. Hybrid role hierarchies introduced in the Generalized ...
Suroop Mohan Chandran, James B. D. Joshi
CDC
2009
IEEE
121views Control Systems» more  CDC 2009»
15 years 9 months ago
Piecewise-linear constrained control for timed continuous Petri nets
— Timed Continuous Petri Net (TCPN) systems are piecewise linear models with input constraints that can approximate the dynamical behavior of a class of timed discrete event syst...
Carlos Renato Vázquez, Manuel Silva
ICISS
2005
Springer
15 years 10 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang