Sciweavers

3712 search results - page 497 / 743
» Role-Based Access Control
Sort
View
AINA
2009
IEEE
15 years 2 months ago
A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor Networks
In this paper, a CDMA-based medium access control (MAC) scheme in underwater acoustic sensor networks is proposed, in which a periodic sleeping mode is jointly employed for the pu...
Jong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon S...
CIDR
2011
221views Algorithms» more  CIDR 2011»
14 years 8 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...
SAC
2011
ACM
14 years 7 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
PAM
2012
Springer
14 years 11 days ago
OFLOPS: An Open Framework for OpenFlow Switch Evaluation
Recent efforts in software-defined networks, such as OpenFlow, give unprecedented access into the forwarding plane of networking equipment. When building a network based on OpenFl...
Charalampos Rotsos, Nadi Sarrar, Steve Uhlig, Rob ...
TEI
2012
ACM
225views Hardware» more  TEI 2012»
14 years 11 days ago
On-body interaction: armed and dangerous
Recent technological advances in input sensing, as well as ultra-small projectors, have opened up new opportunities for interaction – the use of the body itself as both an input...
Chris Harrison, Shilpa Ramamurthy, Scott E. Hudson