Sciweavers

379 search results - page 34 / 76
» Addressing Dynamism in E-Negotiations by Workflow Management...
Sort
View
CN
2004
115views more  CN 2004»
14 years 9 months ago
Bandwidth provisioning and pricing for networks with multiple classes of service
Network service providers purchase large point-to-point connections from network owners, then offer individual users network access at a price. Appropriately provisioning (purchas...
Errin W. Fulp, Douglas S. Reeves
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
PERCOM
2007
ACM
15 years 9 months ago
The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario
Due to the inherent nature of their heterogeneity, resource scarcity and dynamism, the provision of middleware for future networked embedded environments is a challenging task. In...
Paolo Costa, Geoff Coulson, Richard Gold, Manish L...
CSFW
2008
IEEE
15 years 4 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
SIGMETRICS
2008
ACM
159views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Weighted fair sharing for dynamic virtual clusters
In a shared server infrastructure, a scheduler controls how quantities of resources are shared over time in a fair manner across multiple, competing consumers. It should support w...
Laura E. Grit, Jeffrey S. Chase