Sciweavers

3712 search results - page 518 / 743
» Role-Based Access Control
Sort
View
JSAC
2011
171views more  JSAC 2011»
14 years 7 months ago
QoS Provisioning for Heterogeneous Services in Cooperative Cognitive Radio Networks
—In this paper, we propose a spectrum allocation framework that jointly considers the Quality-of-Service (QoS) provisioning for heterogeneous secondary Real-Time (RT) and Non-Rea...
Ammar Alshamrani, Xuemin (Sherman) Shen, Liang-Lia...
INFOCOM
2012
IEEE
13 years 7 months ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
INFOCOM
2012
IEEE
13 years 7 months ago
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
—Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. The mOSNs collect a large amount of locati...
Wei Wei, Fengyuan Xu, Qun Li
EUROSYS
2008
ACM
16 years 1 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
INFOCOM
2007
IEEE
15 years 11 months ago
A Cross-Layer Architecture to Exploit Multi-Channel Diversity with a Single Transceiver
—The design of multi-channel multi-hop wireless mesh networks is centered around the way nodes synchronize when they need to communicate. However, existing designs are confined ...
Jay A. Patel, Haiyun Luo, Indranil Gupta