Sciweavers

1894 search results - page 342 / 379
» A TLA Proof System
Sort
View
TCS
2010
14 years 8 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
TDSC
2010
101views more  TDSC 2010»
14 years 8 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...
COMPSEC
2010
122views more  COMPSEC 2010»
14 years 8 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
INFOCOM
2009
IEEE
15 years 4 months ago
Isolating Physical PER for Smart Rate Selection in 802.11
—Current rate control (selection) algorithms in IEEE 802.11 are not based on accurate measurements of packet errors caused at the physical layer. Instead, algorithms act on measu...
Malik Ahmad Yar Khan, Darryl Veitch
ICES
2010
Springer
148views Hardware» more  ICES 2010»
14 years 7 months ago
HyperNEAT for Locomotion Control in Modular Robots
Abstract. In an application where autonomous robots can amalgamate spontaneously into arbitrary organisms, the individual robots cannot know a priori at which location in an organi...
Evert Haasdijk, Andrei A. Rusu, A. E. Eiben