Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,530,369 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Dynamic Resource Allocation for Heterogeneous Services in Cognitive Radio Networks with Imperfect Channel Sensing
Renchao Xie
,
F. Yu
,
Hong Ji
Global Communications Conference
2011
Corpus ID: 14257153
In cognitive radio networks (CRNs), perfect knowledge of a dynamic radio environment is hard to know due to hardware limitation…
Expand
Highly Cited
2010
Highly Cited
2010
Sequential cooperative sensing for multi-channel cognitive radios
Seung-Jun Kim
,
G. Giannakis
IEEE International Conference on Acoustics…
2010
Corpus ID: 10432893
sequential cooperative spectrum sensing algorithm is developed for multi-channel cognitive radio (CR) systems. Each CR quantizes…
Expand
Highly Cited
2007
Highly Cited
2007
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Tingjian Ge
,
S. Zdonik
IEEE International Conference on Data Engineering
2007
Corpus ID: 181019
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of…
Expand
Highly Cited
2005
Highly Cited
2005
Performance of ad hoc routing using directional antennas
Romit Roy Choudhury
,
N. Vaidya
Ad hoc networks
2005
Corpus ID: 16264009
Highly Cited
2005
Highly Cited
2005
On the Correctness of Operating System Kernels
M. Gargano
,
Mark A. Hillebrand
,
Dirk Leinenbach
,
W. Paul
International Conference on Theorem Proving in…
2005
Corpus ID: 13100398
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless…
Expand
Highly Cited
2004
Highly Cited
2004
An efficient uplink scheduling algorithm for VoIP services in IEEE 802.16 BWA systems
Howon Lee
,
T. Kwon
,
D. Cho
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 23822513
An efficient uplink scheduling algorithm for VoIP services is very important for supporting a large number of users with various…
Expand
Highly Cited
2002
Highly Cited
2002
Bluetooth and IEEE 802.11 coexistence: analytical performance evaluation in fading channel
A. Conti
,
D. Dardari
,
G. Pasolini
,
O. Andrisano
IEEE International Symposium on Personal, Indoor…
2002
Corpus ID: 7751042
The performance in terms of the mean packet error probability (PEP) in a Rayleigh fading channel with thermal noise is…
Expand
Review
2002
Review
2002
Information management of automatic data capture: an overview of technical developments
Alan D. Smith
,
Felix Offodile
Information Management & Computer Security
2002
Corpus ID: 37025094
Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT…
Expand
Highly Cited
1994
Highly Cited
1994
ATMR: Asynchronous Transfer Mode Ring Protocol
K. Imai
,
Tadashi Ito
,
H. Kasahara
,
N. Morita
Comput. Networks ISDN Syst.
1994
Corpus ID: 835220
Highly Cited
1983
Highly Cited
1983
NIL: An integrated language and system for distributed programming
R. Strom
,
S. Yemini
SIGPLAN Conferences and Workshops
1983
Corpus ID: 16064742
This paper presents features of the NIL programming language which support the construction of distributed software systems: (1…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE