Sciweavers

3712 search results - page 465 / 743
» Role-Based Access Control
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
106
Voted
BROADNETS
2007
IEEE
15 years 11 months ago
Improving VoIP call capacity over IEEE 802.11 networks
— The expected VoIP call capacity in a one hop IEEE 802.11b network with G.711 voice codec is about 85 simultaneous calls, but the actual observed capacity is only 5 calls even a...
Yeonsik Jeong, Sandeep Kakumanu, Cheng-Lin Tsao, R...
GLOBECOM
2007
IEEE
15 years 11 months ago
Cross-Layer Optimization for Video Communication Over AWGN Channel
In this paper, cross-layer optimization approach is applied from video coding to the physical layer through Media Access Control (MAC) layer. We mainly focus on resource allocatio...
Cheolhong An, Truong Q. Nguyen
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
15 years 11 months ago
False Information in Internet Auction Communities
As one of the most important features, the Internet enables individuals to make their personal thoughts and opinions easily accessible to the global community of Internet users. N...
Oliver Hinz
ICC
2007
IEEE
229views Communications» more  ICC 2007»
15 years 11 months ago
CD-MAC: Cooperative Diversity MAC for Robust Communication in Wireless Ad Hoc Networks
— This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability to improve robus...
Sangman Moh, Chansu Yu, Seung-Min Park, Heung-Nam ...