Sciweavers

66 search results - page 10 / 14
» bell 2008
Sort
View
ADHOC
2008
146views more  ADHOC 2008»
14 years 9 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
80
Voted
JCP
2008
142views more  JCP 2008»
14 years 9 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
SIGOPS
2008
183views more  SIGOPS 2008»
14 years 9 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
URBAN
2008
86views more  URBAN 2008»
14 years 9 months ago
Social area analysis, data mining, and GIS
: There is a long tradition of describing cities through a focus on the characteristics of their residents. A brief review of the history of this approach to describing cities high...
Seth E. Spielman, Jean-Claude Thill
TCOM
2010
120views more  TCOM 2010»
14 years 7 months ago
Improved linear soft-input soft-output detection via soft feedback successive interference cancellation
—We propose an improved minimum mean square error (MMSE) vertical Bell Labs layered space-time (V-BLAST) detection technique, called a soft input, soft output, and soft feedback ...
Jun Won Choi, Andrew C. Singer, Jung Woo Lee, Nam ...