Sciweavers

1057 search results - page 181 / 212
» Type-Based Distributed Access Control
Sort
View
93
Voted
ECOOPW
2003
Springer
15 years 5 months ago
Advancing the State of the Art in Run-Time Inspection
levels of abstraction. Lacking well-established technologies and models for representing and accessing program dynamics, tools must use ad-hoc mechanisms. This limits reuse and int...
Robert E. Filman, Katharina Mehner, Michael Haupt
105
Voted
ICDCSW
2002
IEEE
15 years 5 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
EUROPAR
2009
Springer
15 years 5 months ago
Last Bank: Dealing with Address Reuse in Non-Uniform Cache Architecture for CMPs
In response to the constant increase in wire delays, Non-Uniform Cache Architecture (NUCA) has been introduced as an effective memory model for dealing with growing memory latenci...
Javier Lira, Carlos Molina, Antonio Gonzále...
ICC
2000
IEEE
153views Communications» more  ICC 2000»
15 years 4 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
MOBICOM
1999
ACM
15 years 4 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins