—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Abstract-- We consider the problem of rate and power allocation in a fading multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a u...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
The performance of RFID anti-collision protocols that are based on framed ALOHA depends on a transmission scheme that controls access to the shared channel. In this paper, we outl...
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...