Sciweavers

449 search results - page 23 / 90
» User experiences with sharing and access control
Sort
View
105
Voted
JSAC
2011
215views more  JSAC 2011»
14 years 4 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su
UM
2009
Springer
15 years 4 months ago
Google Shared. A Case-Study in Social Search
Web search is the dominant form of information access and everyday millions of searches are handled by mainstream search engines, but users still struggle to find what they are lo...
Barry Smyth, Peter Briggs, Maurice Coyle, Michael ...
INFOCOM
2009
IEEE
15 years 4 months ago
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
—Distributed sensor data storage and retrieval has gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more ...
Shucheng Yu, Kui Ren, Wenjing Lou
COMPSAC
2001
IEEE
15 years 1 months ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...
SACMAT
2009
ACM
15 years 4 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...