咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是191-200 订阅
排序:
IEEE 802.11 DCF MAC Protocol for Cognitive Radio Networks: Cooperative Basic access Vs RTS/CTS  14
IEEE 802.11 DCF MAC Protocol for Cognitive Radio Networks: C...
收藏 引用
International symposium on Communications and Information technologies
作者: Dappuri, Bhasker Venkatesh, T. G. Indian Inst Technol Madras Dept Elect Engn Madras 600036 Tamil Nadu India
In this paper we study the role of control/status channel in MAC protocol of cognitive radio networks. To this end we consider three channel access schemes of IEEE 802.11 DCF namely (i) the Basic access mechanism that... 详细信息
来源: 评论
Adaptive flow control proxy for enhancing downlink TCP throughput in infrastructure WLANs  14
Adaptive flow control proxy for enhancing downlink TCP throu...
收藏 引用
14th International symposium on Communications and Information technologies, ISCIT 2014
作者: Jian, Zhang Tianhao, Guo Jilong, Liu Mingwu, Yao School of Telecommunications Engineering Xidian University Xi'an China
WLANs (Wireless Local Area Networks) are widely used for Internet access. But the WLANs in locations such as airports and large conventions usually suffer poor performance in terms of downlink TCP (Transmission Contro... 详细信息
来源: 评论
What Are the Most Important Challenges for access control in New Computing Domains, such as Mobile, Cloud and Cyber-physical Systems?  14
What Are the Most Important Challenges for Access Control in...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Bauer, Lujo Kerschbaum, Florian Carnegie Mellon Univ Pittsburgh PA 15213 USA SAP Karlsruhe Germany
We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems;... 详细信息
来源: 评论
Adaptive Flow control Proxy for Enhancing Downlink TCP throughput in Infrastructure WLANs
Adaptive Flow Control Proxy for Enhancing Downlink TCP Throu...
收藏 引用
International symposium on Communications and Information technologies
作者: Zhang Jian Guo Tianhao Liu Jilong Yao Mingwu Xidian Univ Sch Telecommun Engn Xian Peoples R China
WLANs (Wireless Local Area Networks) are widely used for Internet access. But the WLANs in locations such as airports and large conventions usually sutTer poor perfonnance in terms of downlink TCP (Transmission Contro... 详细信息
来源: 评论
A Novel Scheme to Ease the Problem of OBSS Networks Based on Admission control and TPC  14
A Novel Scheme to Ease the Problem of OBSS Networks Based on...
收藏 引用
International symposium on Communications and Information technologies
作者: Wu, Jie Jiang, Ting Beijing Univ Posts & Telecommun Key Lab Univ Wireless Commun Beijing Peoples R China
Since wireless local area network (WLAN) can support high transmission rate with low cost, the use of WLAN is increasing rapidly. the WLAN has become very congested, and in the dense environment, Overlapping BSS (basi... 详细信息
来源: 评论
MAC Protocol Designs for OFDMA-PONs  14
MAC Protocol Designs for OFDMA-PONs
收藏 引用
International symposium on Communications and Information technologies
作者: Lim, Wansu Shin, Seokjoo Yang, Yeon-Mo Kumoh Natl Inst Technol Sch Elect Engn 61 Daehak Ro Yangho Dong Gumi 730701 Gyeongbuk South Korea Chosun Univ Dept Comp Engn Gwangju 501759 South Korea
this paper provides specifications of the parameters defining the design of medium access control (MAC) protocols for orthogonal frequency division multiple access (OFDMA) passive optical networks (PONs). Network arch... 详细信息
来源: 评论
A Dynamic Risk-based access control Architecture for Cloud Computing
A Dynamic Risk-based Access Control Architecture for Cloud C...
收藏 引用
14th IEEE/IFIP Network Operations and Management symposium (NOMS)
作者: dos Santos, Daniel Ricardo Westphall, Carla Merkle Westphall, Carlos Becker Univ Fed Santa Catarina Networks & Management Lab Florianopolis SC Brazil
Cloud computing is a distributed computing model that still faces problems. New ideas emerge to take advantage of its features and among the research challenges found in the cloud, we can highlight Identity and access... 详细信息
来源: 评论
Delay Efficient Emergency access control Protocol in Medical Implant Communication  14
Delay Efficient Emergency Access Control Protocol in Medical...
收藏 引用
International symposium on Communications and Information technologies
作者: thapa, Anup Kwak, Kyung Sup Inha Univ Dept Informat & Commun Inchon South Korea
In order to find out current operating channel of the hub during emergency in medical implant communication, an implant node sequentially sends an empty frame in all the available channels until it receives an acknowl... 详细信息
来源: 评论
Re-thinking Networked Privacy, Security, Identity and access control in our Surveillance States  14
Re-thinking Networked Privacy, Security, Identity and Access...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Clement, Andrew Univ Toronto Fac Informat 140 St George St Toronto ON M5S 3G6 Canada
Mass surveillance activities by the security agencies of the Five Eyes countries (e.g. NSA, CSEC, etc) pose a significant challenge to those who care about the privacy, security and other democratic rights related to ... 详细信息
来源: 评论
iA-MAC: improved Adaptive Medium access control protocol for Wireless Body Area Networks  14
iA-MAC: improved Adaptive Medium Access Control protocol for...
收藏 引用
International symposium on Communications and Information technologies
作者: Ahmad, Ashfaq Javaid, Nadeem Khan, Zahoor Ali Imran, Muhammad Alnuem, Mohammed COMSATS Inst Informat Technol Islamabad Pakistan Dalhousie Univ FE Internetworking Program Halifax NS Canada King Saud Univ Coll Comp & Informat Sci Ryadh Saudi Arabia
this paper presents improved Adaptive Medium access control (iA-MAC) protocol for Wireless Body Area Networks (WBANs). In addition to the adaptive guard band assignment technique, the newly proposed protocol has an im... 详细信息
来源: 评论