نتایج جستجو برای: media access control

تعداد نتایج: 1852182  

2012
Zhuo Wei Xuhua Ding Robert H. Deng Yongdong Wu

Partial encryption is often used as a tradeoff between security and performance to protect scalable video data. In this paper, we argue that although partial encryption is strong enough for access control, it is not adequate for content confidentiality protection. We conduct experiments to show that partially encrypted H.264/SVC (scalable video coding) streams leak significant content informati...

2014
Narendran Rajagopalan C. Mala

Performance of Wireless LAN can be improved at each layer of the protocol stack with respect to energy efficiency. The Media Access Control layer is responsible for the key functions like access control and flow control. During contention, Backoff algorithm is used to gain access to the medium with minimum probability of collision. After studying different variations of back off algorithms that...

2001
N. Batsios

In this paper the design of a multiservice MAC (Medium Access Control) protocol, as a candidate for the uplink communication channel for LEO constellations is proposed. The proposed scheme is just the combination of conventional PRMA protocol and CDMA techniques, which seems to be a very promising access method for the case of mixed voice/data traffic. A transmit permission technique based on D...

Journal: :Wireless Personal Communications 2007
Polychronis Koutsakis

In this paper we propose and evaluate a Medium Access Control (MAC) protocol for the efficient integration of high quality video traffic with ftp data packet traffic over a wireless cellular channel of very high capacity. We envision a system where the mobile terminals are considered to be high performance devices with extended storage capabilities which can act like cache memories streaming mu...

2017
Milad Mirbabaie Elisa Zapatka

Uncertainty in crises often leads to knowledge gaps, which can be bridged through people’s communication, resulting in sensemaking. Because research dealing with the identification of roles to examine how they guide sensemaking is almost non-existent, this paper seeks to clarify this problem. In the context of crisis communication related to the Brussels bombings in 2016, first social network a...

2000
Randall D. Burris M. K. Gleicher H. H. Holmes Daniel L. Million S. R. White

As computers become more capable, researchers of all types are finding it necessary to store massive quantities of data generated by simulations or experiments and to retrieve them at high rate for analysis or visualization. As a consequence, strong needs have arisen for storage systems tuned for particular needs; significant improvements in storage speed and access control; optimized wide-area...

2006
Leonidas Fegaras Mohan Kumar

GENERALIZATION AND ENFORCEMENT OF ROLE-BASED ACCESS CONTROL USING A NOVEL EVENT-BASED APPROACH

2013
Leanid Krautsevich Aliaksandr Lazouski Fabio Martinelli Artsiom Yautsiukhin

Attribute-based Access Control (ABAC) was recently proposed as a general model which is able to capture the main existing access control models. This paper discusses the problems of configuring ABAC and engineering access policies. We question how to design attributes, how to assign attributes to subjects, objects, actions, and how to formulate access policies which bind subjects to objects and...

Journal: :IEE Proceedings - Software 2006
David M. Eyers Jean Bacon Ken Moody

The United Kingdom National Health Service strategy is to have a full electronic health records service available nationally by 2008. Secure, scalable, access control infrastructure will be critical to the success of such an initiative. To this end, a prototype for such a service, built over the OASIS role-based access control architecture is presented. How the implementation achieves scalabili...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید