Sciweavers

3712 search results - page 511 / 743
» Role-Based Access Control
Sort
View
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 8 months ago
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-b...
Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf
WCNC
2010
IEEE
15 years 8 months ago
ROPA: A MAC Protocol for Underwater Acoustic Networks with Reverse Opportunistic Packet Appending
—In most existing sender-initiated handshaking based underwater Media Access Control (MAC) protocols, only the initiating sender is allowed to transmit data packets to its intend...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani
DATE
2004
IEEE
121views Hardware» more  DATE 2004»
15 years 8 months ago
Experiences during the Experimental Validation of the Time-Triggered Architecture
During last years, the Time-Triggered Architecture (TTA) has been gaining acceptance as a generic architecture for highly dependable real-time systems. It is now being used to imp...
Sara Blanc, Joaquin Gracia, Pedro J. Gil
CSE
2009
IEEE
15 years 8 months ago
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens
Abstract--Web 2.0 users have many choices of contenthosting or application-service providers (CSPs). It can be difficult for a user to share content with a set of real-life friends...
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov