Sciweavers

3712 search results - page 487 / 743
» Role-Based Access Control
Sort
View
CATS
2008
15 years 6 months ago
Verifying Michael and Scott's Lock-Free Queue Algorithm using Trace Reduction
Lock-free algorithms have been developed to avoid various problems associated with using locks to control access to shared data structures. These algorithms are typically more int...
Lindsay Groves
IMECS
2007
15 years 6 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
NETWORKING
2008
15 years 6 months ago
A Distributed Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks
Abstract. To support large-scale live Internet broadcasting services efficiently in content delivery networks (CDNs), it is essential to exploit peer-to-peer capabilities among end...
Jun Guo, Sanjay Jha
OWLED
2008
15 years 6 months ago
OWLlink: DIG for OWL 2
The OWLlink interface provides an implementation-neutral mechanism for accessing OWL reasoner functionality. In contrast to its DL-oriented predecessor DIG, OWLlink relies on OWL 2...
Thorsten Liebig, Marko Luther, Olaf Noppens, Maria...
NETWORKING
2007
15 years 6 months ago
Performance and Equilibrium Analysis of Heterogeneous IEEE 802.11 Based WLANs
This paper presents a general model to study the medium access control (MAC) layer performance and equilibrium of WLANs consisting of nodes with different MAC parameters (e.g., ba...
Hao Zhu