Sciweavers

869 search results - page 34 / 174
» Improved access point selection
Sort
View
ER
2008
Springer
110views Database» more  ER 2008»
15 years 3 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 6 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
SAINT
2005
IEEE
15 years 7 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
JSAC
2011
115views more  JSAC 2011»
14 years 9 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
CORR
2008
Springer
189views Education» more  CORR 2008»
15 years 2 months ago
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
We study the problem of dynamic spectrum sensing and access in cognitive radio systems as a partially observed Markov decision process (POMDP). A group of cognitive users cooperati...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli