Sciweavers

3303 search results - page 553 / 661
» Multidimensional Access Methods
Sort
View
ADHOC
2005
122views more  ADHOC 2005»
14 years 10 months ago
Bandwidth guaranteed call admission in TDMA/CDMA ad hoc wireless networks
This paper first studied the timeslot assignment problem in time division multiple access/code division multiple access (TDMA/CDMA) wireless ad hoc networks. Given a path P, we pr...
Hai Liu, Xiaohua Jia, Deying Li, Chan-Hee Lee
IJMI
2007
140views more  IJMI 2007»
14 years 10 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
SPE
2008
126views more  SPE 2008»
14 years 10 months ago
ANTLRWorks: an ANTLR grammar development environment
Programmers tend to avoid using language tools, resorting to ad-hoc methods, because tools can be hard to use, their parsing strategies can be difficult to understand and debug, a...
Jean Bovet, Terence Parr
TCOM
2008
75views more  TCOM 2008»
14 years 10 months ago
Transmitter-based processing for down-link DS/CDMA systems with multiple transmit antennas
In cellular wireless communication systems, there have been various receiver-based techniques for performance improvement. However, it may be desirable to use transmitterbased tech...
Chang Park, Kwang Lee
TCS
2008
14 years 10 months ago
New constructions for provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masu...