Sciweavers

3712 search results - page 457 / 743
» Role-Based Access Control
Sort
View
FAST
2009
15 years 2 months ago
Dynamic Resource Allocation for Database Servers Running on Virtual Storage
We introduce a novel multi-resource allocator to dynamically allocate resources for database servers running on virtual storage. Multi-resource allocation involves proportioning t...
Gokul Soundararajan, Daniel Lupei, Saeed Ghanbari,...
166
Voted
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 2 months ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...
JSAC
2011
215views more  JSAC 2011»
14 years 12 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su
TIT
2011
128views more  TIT 2011»
14 years 12 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
WWW
2011
ACM
14 years 12 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill