Results 61 to 70 of about 7,761,143 (347)
A Customizable Conflict Resolution and Attribute-Based Access Control Framework for Multi-Robot Systems [PDF]
As multi-robot systems continue to advance and become integral to various applications, managing conflicts and ensuring secure access control are critical challenges that need to be addressed. Access control is essential in multi-robot systems to ensure secure and authorized interactions among robots, protect sensitive data, and prevent unauthorized ...
arxiv
Event Systems and Access Control [PDF]
We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems specified as event systems with fairness.
Merz, Stephan, Méry, Dominique
core +3 more sources
Auction-style cooperative medium access control
A cooperative Medium Access Control (MAC) protocol employing auction-style relay selection combined with superposition coding is designed. In our proposed scheme, the source achieves its target throughput with the aid of cooperation.
Feng, Jiao, Hanzo, Lajos, Zhang, Rong
core +1 more source
A Game-Theoretic Framework for Medium Access Control [PDF]
In this paper, we generalize the random access game model, and show that it provides a general game-theoretic framework for designing contention based medium access control.
Chen, Lijun, Cui, Tao, Low, Steven H.
core +1 more source
Insights into PI3K/AKT signaling in B cell development and chronic lymphocytic leukemia
This Review explores how the phosphoinositide 3‐kinase and protein kinase B pathway shapes B cell development and drives chronic lymphocytic leukemia, a common blood cancer. It examines how signaling levels affect disease progression, addresses treatment challenges, and introduces novel experimental strategies to improve therapies and patient outcomes.
Maike Buchner
wiley +1 more source
Evaluating the quality of routinely reported data on malaria commodity stocks in Guinea, 2014–2016
Background Ensuring malaria commodity availability at health facilities is a cornerstone of malaria control. Since 2013, the Guinea National Malaria Control Programme has been routinely collecting data on stock levels of key malaria commodities through a
Yu Sun+10 more
doaj +1 more source
Function-Based Access Control (FBAC)
This paper is a first full version of the paper accepted at ACM CCS 2016, 8th workshop on Managing Insider Threats (MIST). The full version will be submitted at a journal. The authors contributed equally.
Arash Shaghaghi, Yvo Desmedt
openaire +3 more sources
Diphthamide synthesis is linked to the eEF2‐client chaperone machinery
The diphthamide modification of eukaryotic translation elongation factor 2 (eEF2) is important for accurate protein synthesis. We addressed the potential coordination of de novo eEF2 synthesis with simultaneous or subsequent diphthamide modification. Our work reveals that the co‐chaperones Hgh1 and Cpr7, which are known to support folding of nascent ...
Lars Kaduhr+4 more
wiley +1 more source
Strengthening Laboratory Management Towards Accreditation: The Lesotho experience
Introduction: The Lesotho Ministry of Health and Social Welfare’s (MOHSW) 5-year strategic plan, as well as their national laboratory policy and yearly operational plans, directly addresses issues of accreditation, indicating their commitment to ...
David Mothabeng+5 more
doaj +1 more source
Strong and Provably Secure Database Access Control
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David+2 more
core +1 more source