Sciweavers

1998 search results - page 145 / 400
» Situated Control Rules
Sort
View
ACSC
2009
IEEE
15 years 11 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ICC
2009
IEEE
154views Communications» more  ICC 2009»
15 years 11 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
156
Voted
WCNC
2008
IEEE
15 years 11 months ago
Neural Network-Based Approach for Adaptive Density Control and Reliability in Wireless Sensor Networks
A primary constraint in wireless sensor networks (WSNs) is obtaining reliable and prolonged network operation with power-limited sensor nodes. Most of the approaches to the energy ...
Renita Machado, Sirin Tekinay
CIKM
2005
Springer
15 years 10 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
ICCNMC
2005
Springer
15 years 10 months ago
Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol
3G-324M is a multimedia transmission protocol designed for 3G communication environment. Meanwhile H.245 standard is a control protocol in 3G-324M and gives specific descriptions a...
Man-Ching Yuen, Ji Shen, Weijia Jia, Bo Han