Sciweavers

3712 search results - page 458 / 743
» Role-Based Access Control
Sort
View
ITIIS
2010
186views more  ITIIS 2010»
14 years 11 months ago
Adaptive Binary Negative-Exponential Backoff Algorithm Based on Contention Window Optimization in IEEE 802.11 WLAN
IEEE 802.11 medium access control (MAC) employs the distributed coordination function (DCF) as the fundamental medium access function. DCF operates with binary exponential backoff...
Bum-Gon Choi, Ju Yong Lee, Min Young Chung
222
Voted
JIPS
2010
462views more  JIPS 2010»
14 years 11 months ago
Challenges to Next Generation Services in IP Multimedia Subsystem
The trend of Next Generation Networks' (NGN) evolution is towards providing multiple and multimedia services to users through ubiquitous networks. The aim of IP Multimedia Sub...
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han...
ICS
2011
Tsinghua U.
14 years 8 months ago
Page placement in hybrid memory systems
Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used...
Luiz E. Ramos, Eugene Gorbatov, Ricardo Bianchini
142
Voted
MICRO
2010
IEEE
121views Hardware» more  MICRO 2010»
15 years 2 months ago
Probabilistic Distance-Based Arbitration: Providing Equality of Service for Many-Core CMPs
Abstract--Emerging many-core chip multiprocessors will integrate dozens of small processing cores with an on-chip interconnect consisting of point-to-point links. The interconnect ...
Michael M. Lee, John Kim, Dennis Abts, Michael R. ...
ICIP
2004
IEEE
16 years 6 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu