Sciweavers

868 search results - page 125 / 174
» Resiliency policies in access control
Sort
View
TIT
2008
110views more  TIT 2008»
15 years 1 months ago
Optimal Cross-Layer Scheduling of Transmissions Over a Fading Multiaccess Channel
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the mediu...
Munish Goyal, Anurag Kumar, Vinod Sharma
ICC
2007
IEEE
288views Communications» more  ICC 2007»
15 years 8 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang
CCS
2010
ACM
15 years 2 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
MIDDLEWARE
2010
Springer
15 years 12 days ago
Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications
Abstract. While Web Services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virt...
Qi Huang, Daniel A. Freedman, Ymir Vigfusson, Ken ...
WSC
1998
15 years 3 months ago
Parallel Simulation for Aviation Applications
The Detailed Policy Assessment Tool (DPAT) is a widely used simulation of air traffic control that incorporates advanced technology for user-friendly operation. DPAT computes cong...
Frederick Wieland