Sciweavers

533 search results - page 8 / 107
» Control flow based obfuscation
Sort
View
95
Voted
CN
2002
106views more  CN 2002»
14 years 9 months ago
Quality of service and flow level admission control in the Internet
We propose to apply an integrated admission control scheme to both streaming flows and elastic flows. It is assumed that streaming flow packets are served with priority in network...
Nabil Benameur, Slim Ben Fredj, Sara Oueslati-Boul...
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 3 months ago
Impact of Interference and Medium Access Control on Flow Allocation in Multi-Hop Wireless Networks
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...
Kun-da Wu, Wanjiun Liao
WSC
1997
14 years 11 months ago
A Java Based System for Specifying Hierarchical Control Flow Graph Models
The portion of the Hierarchical Modeling And Simulation System-Java (HiMASS-j) used for specifying Hierarchical Control Flow Graph (HCFG) Models is described. The specification o...
Thorsten Daum, Robert G. Sargent
ICCSA
2007
Springer
15 years 1 months ago
A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization
Network-on-Chip (NoC) has been proposed as an attractive alternative to traditional dedicated busses in order to achieve modularity and high performance in the future System-on-Chi...
Mohammad Sadegh Talebi, Fahimeh Jafari, Ahmad Khon...
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
14 years 9 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki