Sciweavers

192 search results - page 33 / 39
» Scalable Access Controls for Lineage
Sort
View
TSMC
2008
162views more  TSMC 2008»
14 years 9 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
14 years 7 months ago
A measurement distribution framework for cooperative navigation using multiple AUVs
Abstract-- In recent years underwater survey and surveillance missions with more than a single Autonomous Underwater Vehicle (AUV) have become more common thanks to more reliable a...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
89
Voted
INFOCOM
2007
IEEE
15 years 3 months ago
A Cross-Layer Architecture to Exploit Multi-Channel Diversity with a Single Transceiver
—The design of multi-channel multi-hop wireless mesh networks is centered around the way nodes synchronize when they need to communicate. However, existing designs are confined ...
Jay A. Patel, Haiyun Luo, Indranil Gupta
82
Voted
ISCA
2007
IEEE
174views Hardware» more  ISCA 2007»
15 years 3 months ago
An integrated hardware-software approach to flexible transactional memory
There has been considerable recent interest in the support of transactional memory (TM) in both hardware and software. We present an intermediate approach, in which hardware is us...
Arrvindh Shriraman, Michael F. Spear, Hemayet Hoss...
89
Voted
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash