Sciweavers

596 search results - page 29 / 120
» Theories of Access Consciousness
Sort
View
104
Voted
ICDE
2010
IEEE
249views Database» more  ICDE 2010»
15 years 5 months ago
PARINET: A tunable access method for in-network trajectories
— In this paper we propose PARINET, a new access method to efficiently retrieve the trajectories of objects moving in networks. The structure of PARINET is based on a combination...
Iulian Sandu Popa, Karine Zeitouni, Vincent Oria, ...
ICC
2009
IEEE
129views Communications» more  ICC 2009»
15 years 5 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
W4A
2006
ACM
15 years 4 months ago
GraSSML: accessible smart schematic diagrams for all
Graphical representations are a powerful way of conveying information. Their use has made life much easier for most sighted users, but people with disabilities or users who work i...
Zaineb Ben Fredj, David A. Duce
86
Voted
ISW
2004
Springer
15 years 4 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
93
Voted
TON
2012
13 years 1 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu