Sciweavers

3712 search results - page 484 / 743
» Role-Based Access Control
Sort
View
143
Voted
ASPDAC
2001
ACM
112views Hardware» more  ASPDAC 2001»
15 years 8 months ago
Parameterized MAC unit implementation
Ethernet communication devices, such as adapter, hub, bridge and switch, all follow IEEE 802.3 standard protocol. We have designed and implemented an integrated 10/100 Mbps Etherne...
Ming-Chih Chen, Ing-Jer Huang, Chung-Ho Chen
ERCIMDL
2000
Springer
118views Education» more  ERCIMDL 2000»
15 years 8 months ago
Evaluating a User-Model Based Personalisation Architecture for Digital News Services
Abstract. An architecture that provides personalised filtering and dissemination of news items is presented. It is based on user profiles and it provides mechanisms that allow the ...
Alberto Díaz Esteban, Pablo Gervás G...
POPL
2000
ACM
15 years 8 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
VL
1992
IEEE
153views Visual Languages» more  VL 1992»
15 years 8 months ago
MAVIS: A Visual Environment for Active Computer Vision
MAVIS is a dataflow visual languagefor computer vision and image processing. It features a high degree of `liveness' and compliance with user directives, providing ajexible e...
Thomas J. Olson, Nicholas G. Klop, Mark R. Hyett, ...
SIGMETRICS
1987
ACM
102views Hardware» more  SIGMETRICS 1987»
15 years 8 months ago
Delay Analysis of a Window Tree Conflict Resolution Algorithm in a Local Area Network Environment
Expressions are found for the throughput and delay performance of a Tree Conflict Resolution Algorithm that is used in a Local Area Network with carrier sensing (and possibly also ...
George C. Polyzos, Mart Molle