Sciweavers

1569 search results - page 185 / 314
» Using active networks technology for dynamic QoS
Sort
View
MMMACNS
2005
Springer
15 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
88
Voted
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
15 years 3 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...
86
Voted
ECRA
2007
140views more  ECRA 2007»
14 years 10 months ago
Strategies in supply chain management for the Trading Agent Competition
Negotiating with suppliers and with customers is a key part of supply chain management. However, with recent technological advances, the mechanisms available to carry out such act...
Yain-Whar Si, David Edmond, Marlon Dumas, Chan U. ...
71
Voted
WWW
2003
ACM
15 years 11 months ago
High-performance spatial indexing for location-based services
Much attention has been accorded to Location-Based Services and location tracking, a necessary component in active, trigger-based LBS applications. Tracking the location of a larg...
Jussi Myllymaki, James H. Kaufman
128
Voted
ISCA
2010
IEEE
413views Hardware» more  ISCA 2010»
15 years 3 months ago
Resistive computation: avoiding the power wall with low-leakage, STT-MRAM based computing
As CMOS scales beyond the 45nm technology node, leakage concerns are starting to limit microprocessor performance growth. To keep dynamic power constant across process generations...
Xiaochen Guo, Engin Ipek, Tolga Soyata