Sciweavers

438 search results - page 31 / 88
» date 2009
Sort
View
88
Voted
ICC
2009
IEEE
107views Communications» more  ICC 2009»
14 years 8 months ago
Evaluation of Link Protection Schemes in Physically Impaired Optical Networks
Link protection schemes for WDM-based optical networks have been extensively researched. Most work to date has ignored the physical layer impairments (PLIs) that could be dominant ...
Amir Askarian, Suresh Subramaniam, Maït&eacut...
CHI
2010
ACM
15 years 5 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
ICASSP
2010
IEEE
14 years 10 months ago
Performance analysis for blind identification of acoustic channels
: © Performance Analysis for Blind Identification of Acoustic Channels Majid Fozunbal HP Laboratories HPL-2009-333 Audio, acoustic systems, blind identification, dereverberation, ...
Majid Fozunbal
83
Voted
FAC
2010
107views more  FAC 2010»
14 years 8 months ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
TRUSTBUS
2010
Springer
14 years 8 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall