Search

Your search keyword '"ACCESS control of computer networks"' showing total 1,090 results

Search Constraints

Start Over You searched for: Descriptor "ACCESS control of computer networks" Remove constraint Descriptor: "ACCESS control of computer networks"
1,090 results on '"ACCESS control of computer networks"'

Search Results

101. Failure rate estimation of overhead electric distribution lines considering data deficiency and population variability.

102. On cooperative transmission range extension in multi-hop wireless ad-hoc and sensor networks: A review.

103. Interference-aware MAC scheduling and admission control for multiple mobile WBANs used in healthcare monitoring.

104. Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation.

105. Stable Queue Management in communication networks.

106. Experimental Study of Capture Effect for Medium Access Control with ALOHA.

107. Toward Practical MAC Design for Underwater Acoustic Networks.

108. Topology properties of a weighted multi-local-world evolving network.

109. Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.

110. NET NEUTRALITY WITH COMPETING INTERNET PLATFORMS.

111. Mining a high level access control policy in a network with multiple firewalls.

112. Achieving weighted fairness in WLAN mesh networks: An analytical model.

113. Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks.

114. A Novel Multi-channel MAC Protocol for Directional Antennas in Ad Hoc Networks.

115. Prioritized access control in IEEE 802.16 networks.

116. Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine.

117. Maximum covering planning of survivable Fiber-Wireless access network considering network connectivity.

118. A novel MAC protocol for IDMA-based multi-beam satellite communication systems.

119. A MAC protocol for the mixed scenario of omnidirectional and directional nodes in an ad hoc network.

120. Efficient slice-aware H.264/AVC video transmission over time-driven priority networks.

121. Design and analysis of distributed utility maximization algorithm for multihop wireless network with inaccurate feedback.

122. Enhanced binary exponential backoff algorithm for fair channel access in the ieee 802.11 medium access control protocol.

123. Security analysis for temporal role based access control.

124. Investigating Energy Efficiency and Timeliness for Linear Wireless Sensor Networks.

126. Performance Evolution of IEEE 802.11b Wireless Local Area Network.

127. Challenges in a Future IP/Ethernet-based In-Car Network for Real-Time Applications.

128. Network Values: The National Information Infrastructure in the Construction of a "Democratic" Internet.

129. Secure Access Authentication for Media Independent Information Service.

130. Convergence of Internet Congestion Control.

131. Improved Routing Algorithm Research for ZigBee Network.

132. Uma Proposta para a Localização Física de Dispositivos Através do Gerenciador de Rede WICD.

133. POLICY 2.0.

134. OpenLIDS: A Lightweight Intrusion Detection System for Wireless Mesh Networks.

135. A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks.

136. After Comcast’s Violation: Evaluating Network Neutrality Legislation in Light of the FCC’s Censure of Comcast.

137. CHAPTER 8: Hackers: How to Defend Against Hacks & Other Attacks.

138. Collaborative Multi-Domains Users’ Authentication Framework for Shareable Web Applications.

139. A system for easy access to scientific information using DOIs.

140. DEVELOPING AN ABSTRACT REPRESENTATION FOR USER INTERFACE ELEMENTS BASED ON DATABASE METADATA.

141. RULE DEPENDENCIES IN ACCESS CONTROL LISTS.

142. SECURITY THREAT SOURCES AND SUPPLIERS: A MANAGEMENT THREAT PROCESS MODEL.

144. H∞ filtering for nonlinear networked systems with randomly occurring distributed delays, missing measurements and sensor saturation.

145. An improved event-triggered communication mechanism and [formula omitted] control co-design for network control systems.

146. Cross-layer resource allocation based on equivalent bandwidth in OFDMA systems.

147. Proper network segments may prevent the next breach.

148. Scenes from an Administrator in Transition: Navigating Organizational Barriers.

149. The eagle has landed – what happens next?

150. DEFINING THE FUTURE OF NETWORKING.

Catalog

Books, media, physical & digital resources