Sciweavers

596 search results - page 30 / 120
» Theories of Access Consciousness
Sort
View
107
Voted
ESORICS
2007
Springer
15 years 5 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
ESA
2009
Springer
90views Algorithms» more  ESA 2009»
15 years 5 months ago
Storing a Compressed Function with Constant Time Access
We consider the problem of representing, in a space-efficient way, a function f : S → Σ such that any function value can be computed in constant time on a RAM. Specifically, ou...
Jóhannes B. Hreinsson, Morten Krøyer...
84
Voted
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
76
Voted
SIGCOMM
1996
ACM
15 years 3 months ago
A Channel Access Scheme for Large Dense Packet Radio Networks
Prior work in the eld of packet radio networks has often assumed a simple success-if-exclusive model of successful reception. This simple model is insucient to model interference...
Timothy J. Shepard
PODC
2010
ACM
15 years 2 months ago
Brief announcement: towards robust medium access in multi-hop networks
This paper introduces the distributed MAC protocol Jade. We consider a multi-hop wireless network with a single communication channel in which a powerful adversary is able to jam ...
Andréa W. Richa, Jin Zhang, Christian Schei...