Sciweavers

3712 search results - page 453 / 743
» Role-Based Access Control
Sort
View
COMPSEC
2008
116views more  COMPSEC 2008»
15 years 5 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
140
Voted
CORR
2010
Springer
168views Education» more  CORR 2010»
15 years 5 months ago
Network evolution and QOS provisioning for integrated femtocell/macrocell networks
Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of s...
Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J...
CORR
2010
Springer
189views Education» more  CORR 2010»
15 years 5 months ago
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions
Abstract--It was shown recently that carrier sense multiple access (CSMA)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing n...
Libin Jiang, Jean C. Walrand
139
Voted
COMCOM
2006
77views more  COMCOM 2006»
15 years 5 months ago
SIP as a unified signalling solution in a beyond 3G system
The adoption of packet-switched technologies in mobile communication systems has enabled the provision of IPbased services to mobile users. Yet, these systems, such as the UMTS net...
Vaggelis Nikas, Georgios V. Lioudakis, Nikolaos L....
JNW
2008
97views more  JNW 2008»
15 years 5 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews