Sciweavers

257 search results - page 18 / 52
» Extending Java for Package based Access Control
Sort
View
SACMAT
2005
ACM
15 years 5 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SCAM
2005
IEEE
15 years 5 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
85
Voted
ADHOC
2007
109views more  ADHOC 2007»
14 years 12 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ICIP
2006
IEEE
16 years 1 months ago
Extending Single-View Scalable Video Coding to Multi-View Based on H.264/AVC
An extension of single-view scalable video coding to multiview is presented in this paper. Scalable video coding is recently developed in the Joint Video Team of ISO/IEC MPEG and ...
Michael Drose, Carsten Clemens, Thomas Sikora
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 6 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar