We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
Workflow systems are used to model a range of scientific and business applications, each requiring a different set of capabilities. We analyze how these heterogeneous approaches ca...
Vasa Curcin, Moustafa Ghanem, Patrick Wendel, Yike...
Abstract— This paper addresses when and how to adjust bandwidth allocations between uplink and downlink in a multi-service wireless network with bandwidth asymmetry under dynamic...
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...