Sciweavers

351 search results - page 49 / 71
» Formalisation and implementation of Access control models
Sort
View
123
Voted
MSWIM
2005
ACM
15 years 6 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
CODES
2005
IEEE
15 years 6 months ago
An architectural level design methodology for embedded face detection
Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, includin...
Vida Kianzad, Sankalita Saha, Jason Schlessman, Ga...
JCP
2008
206views more  JCP 2008»
15 years 15 days ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
121
Voted
PPOPP
2010
ACM
15 years 7 months ago
An adaptive performance modeling tool for GPU architectures
This paper presents an analytical model to predict the performance of general-purpose applications on a GPU architecture. The model is designed to provide performance information ...
Sara S. Baghsorkhi, Matthieu Delahaye, Sanjay J. P...
INFOCOM
2007
IEEE
15 years 6 months ago
Millimeter Wave WPAN: Cross-Layer Modeling and Multi-Hop Architecture
— The 7 GHz of unlicensed spectrum in the 60 GHz band offers the potential for multiGigabit indoor wireless personal area networking (WPAN). With recent advances in the speed of ...
Sumit Singh, Federico Ziliotto, Upamanyu Madhow, E...