Sciweavers

596 search results - page 51 / 120
» Theories of Access Consciousness
Sort
View
NDSS
2008
IEEE
15 years 7 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
98
Voted
CCS
2009
ACM
16 years 1 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SIGCOMM
2009
ACM
15 years 7 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
102
Voted
VTC
2008
IEEE
152views Communications» more  VTC 2008»
15 years 7 months ago
Network Controlled Joint Radio Resource Management for Heterogeneous Networks
Abstract— In this paper, we propose a way of achieving optimality in radio resource management (RRM) for heterogeneous networks. We consider a micro or femto cell with two co-loc...
Marceau Coupechoux, Jean Marc Kelif, Philippe Godl...
80
Voted
HICSS
2003
IEEE
93views Biometrics» more  HICSS 2003»
15 years 6 months ago
Performance of Bluetooth Bridges in Scatternets With Exhaustive Service Scheduling
— The performance of two Bluetooth piconets linked through a bridge device is analyzed using the tools of queueing theory. We analyze both the Master/Slave (MS) and Slave/Slave (...
Jelena V. Misic, Vojislav B. Misic