Sciweavers

114 search results - page 23 / 23
» On the Controlled Evolution of Access Rules in Cooperative I...
Sort
View
WAC
2004
Springer
149views Communications» more  WAC 2004»
13 years 10 months ago
BIONETS: BIO-inspired NExt generaTion networkS
The amount of information in the new emerging all-embracing pervasive environments will be enormous. Current Internet protocol conceived almost forty years ago, were never planned ...
Iacopo Carreras, Imrich Chlamtac, Hagen Woesner, C...
COMCOM
2006
121views more  COMCOM 2006»
13 years 5 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
ENTCS
2007
168views more  ENTCS 2007»
13 years 5 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
CCS
2007
ACM
13 years 11 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...