Sciweavers

115 search results - page 22 / 23
» Hidden access control policies with hidden credentials
Sort
View
ICC
2000
IEEE
153views Communications» more  ICC 2000»
13 years 10 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
NAR
2008
103views more  NAR 2008»
13 years 6 months ago
DBD--taxonomically broad transcription factor predictions: new content and functionality
DNA-binding domain (DBD) is a database of predicted sequence-specific DNA-binding transcription factors (TFs) for all publicly available proteomes. The proteomes have increased fr...
Derek Wilson, Varodom Charoensawan, Sarah K. Kumme...
SECON
2010
IEEE
13 years 4 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
WSC
2004
13 years 7 months ago
Impact of Production Run Length on Supply Chain Performance
This paper documents an experiment designed to show the value of simulation in understanding the relationship between production run lengths and overall supply chain performance. ...
David J. Parsons, Robin J. Clark, Kevin L. Payette
SIGMETRICS
2009
ACM
165views Hardware» more  SIGMETRICS 2009»
14 years 24 days ago
Understanding intrinsic characteristics and system implications of flash memory based solid state drives
Flash Memory based Solid State Drive (SSD) has been called a “pivotal technology” that could revolutionize data storage systems. Since SSD shares a common interface with the t...
Feng Chen, David A. Koufaty, Xiaodong Zhang