- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Online collaboration and sharing is the central theme of many webbased services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2...
Jiangming Yang, Haixun Wang, Ning Gu, Yiming Liu, ...
Reasoning about program equivalence is one of the oldest problems in semantics. In recent years, useful techniques have been developed, based on bisimulations and logical relation...
Orthophotos (or orthoimages if in digital form) have long been recognised as a supplement or alternative to standard maps. The increasing applications of orthoimages require effor...
Xiaoye Liu, Zhenyu Zhang, Jim Peterson, Shobhit Ch...
Abstract—Market-based mechanisms offer promising approaches for spectrum access in cognitive radio networks. In this paper, we focus on two market models, one with a monopoly pri...
Lei Yang, Hongseok Kim, Junshan Zhang, Mung Chiang...