Sciweavers

4887 search results - page 877 / 978
» System Level Design Using C
Sort
View
136
Voted
COMPSAC
2007
IEEE
15 years 6 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
125
Voted
CONEXT
2007
ACM
15 years 6 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
121
Voted
PADL
2010
Springer
15 years 4 months ago
A Simple and Efficient Implementation of Concurrent Local Tabling
Newer Prolog implementations commonly offer support for multi-threading, and have also begun to offer support for tabling. However, most implementations do not yet integrate tablin...
Rui Marques, Terrance Swift, José C. Cunha
144
Voted
WICON
2008
15 years 4 months ago
Seamless content delivery
Widespread and affordable broadband access opens up opportunities for delivery of new streaming services. However, what is expected to fundamentally change the way that people use...
Theodore Zahariadis, George Leoleis, Thomas Schier...
113
Voted
WSC
2004
15 years 4 months ago
Applying Statistical Control Techniques to Air Traffic Simulations
While the literature contains several adaptive sampling techniques for statistical comparison of competing simulated system configurations and for embedded statistical computation...
Kirk C. Benson, David Goldsman, Amy R. Pritchett