Sciweavers

4592 search results - page 653 / 919
» Framework for Studying Substitution
Sort
View
107
Voted
ACSAC
2008
IEEE
15 years 7 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
CBMS
2008
IEEE
15 years 7 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
142
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 7 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
93
Voted
CEC
2008
IEEE
15 years 7 months ago
Memetic Gradient Search
—This paper reviews the different gradient-based schemes and the sources of gradient, their availability, precision and computational complexity, and explores the benefits of usi...
Boyang Li, Yew-Soon Ong, Minh Nghia Le, Chi Keong ...
112
Voted
CISS
2008
IEEE
15 years 7 months ago
Bandwidth exchange as an incentive for relaying
Abstract—Relay cooperation has been recognized as an important mechanism to enhance connectivity and throughput in multi-hop wireless networks, especially under varying channel c...
Dan Zhang, Omer Ileri, Narayan B. Mandayam