Sciweavers

3712 search results - page 516 / 743
» Role-Based Access Control
Sort
View
GLOBECOM
2010
IEEE
15 years 2 months ago
Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Exist...
Piergiuseppe Di Marco, Pan Gun Park, Carlo Fischio...
INFOCOM
2010
IEEE
15 years 2 months ago
Energy Efficient Algorithms for the RFID Estimation Problem
RFID has been gaining popularity for inventory control, object tracking, and supply chain management in warehouses, retail stores, hospitals, etc. Periodically and automatically es...
Tao Li, Samuel Wu, Shigang Chen, Mark Yang
USS
2010
15 years 2 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
WISE
2010
Springer
15 years 2 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
HIPC
2009
Springer
15 years 2 months ago
Impact of early abort mechanisms on lock-based software transactional memory
Software transactional memory (STM) is an emerging concurrency control mechanism for shared memory accesses. Early abort is one of the important techniques to improve the executio...
Zhengyu He, Bo Hong