Sciweavers

270 search results - page 29 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
ASAP
2004
IEEE
171views Hardware» more  ASAP 2004»
15 years 1 months ago
CHARMED: A Multi-Objective Co-Synthesis Framework for Multi-Mode Embedded Systems
In this paper, we present a modular co-synthesis framework called CHARMED that solves the problem of hardware-software co-synthesis of periodic, multi-mode, distributed, embedded ...
Vida Kianzad, Shuvra S. Bhattacharyya
FAST
2003
14 years 11 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
MASCOTS
2004
14 years 11 months ago
MC-CDMA Based IEEE 802.11 Wireless LAN
In this paper, a modified version of the IEEE 802.11a protocol is proposed and evaluated. We combine MultiCarrier Code Division Multiple Access (MC-CDMA), a novel, high capacity m...
Georgios Orfanos, Jörg Habetha, Ling Liu
ICDCS
2005
IEEE
15 years 3 months ago
Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout
We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossipbased protocol using adaptive fanout. We model three versions of go...
Satish Verma, Wei Tsang Ooi
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
15 years 10 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis