Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial th...
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it shoul...