Sciweavers

3712 search results - page 506 / 743
» Role-Based Access Control
Sort
View
PEWASUN
2004
ACM
15 years 10 months ago
A simulation study on multi-rate mobile ad hoc networks
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-r...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
SWS
2004
ACM
15 years 10 months ago
Ticket-based fine-grained authorization service in the dynamic VO environment
Virtual Organization (VO) is a collection of users and distributed resources, in which resources are shared by users. Creating VOs is very important task in Grid computing. VOs ar...
Byung Joon Kim, Sung Je Hong, Jong Kim
161
Voted
SDMW
2004
Springer
15 years 10 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
ISCA
2003
IEEE
124views Hardware» more  ISCA 2003»
15 years 10 months ago
Banked Multiported Register Files for High-Frequency Superscalar Microprocessors
Multiported register files are a critical component of high-performance superscalar microprocessors. Conventional multiported structures can consume significant power and die ar...
Jessica H. Tseng, Krste Asanovic
ATS
2009
IEEE
127views Hardware» more  ATS 2009»
15 years 10 months ago
On the Generation of Functional Test Programs for the Cache Replacement Logic
Caches are crucial components in modern processors (both stand-alone or integrated into SoCs) and their test is a challenging task, especially when addressing complex and high-fre...
Wilson J. Perez, Danilo Ravotto, Edgar E. Sá...