Sciweavers

800 search results - page 75 / 160
» XML access control using static analysis
Sort
View
132
Voted
JSAC
2008
92views more  JSAC 2008»
15 years 3 months ago
Multiuser diversity with capture for wireless networks: protocol and performance analysis
Abstract--In a wireless network, with the aid of rate adaptation, multiuser diversity can be exploited by allowing the mobile user with the best channel to use the channel. However...
Justin Foo, Defeng Huang
148
Voted
VLDB
1999
ACM
162views Database» more  VLDB 1999»
15 years 7 months ago
Active Views for Electronic Commerce
Electronic commerce is emerging as a major Websupported application. In this paper we argue that database technology can, and should, provide the backbone for a wide range of such...
Serge Abiteboul, Bernd Amann, Sophie Cluet, Anat E...
138
Voted
WCNC
2008
IEEE
15 years 10 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...
155
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
131
Voted
SC
2009
ACM
15 years 10 months ago
Scalable temporal order analysis for large scale debugging
We present a scalable temporal order analysis technique that supports debugging of large scale applications by classifying MPI tasks based on their logical program execution order...
Dong H. Ahn, Bronis R. de Supinski, Ignacio Laguna...