Sciweavers

617 search results - page 71 / 124
» Debugging distributed programs using controlled re-execution
Sort
View
120
Voted
ICMCS
2006
IEEE
219views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Analysis of Multi-User Congestion Control for Video Streaming Over Wireless Networks
When multiple video sources are live-encoded and transmitted over a common wireless network, each stream needs to adapt its encoding parameters to wireless channel fluctuations, ...
Xiaoqing Zhu, Bernd Girod
GRID
2004
Springer
15 years 7 months ago
A Stochastic Control Model for Deployment of Dynamic Grid Services
We introduce a formal model for deployment and hosting of a dynamic grid service wherein the service provider must pay a resource provider for the use of computational resources. ...
Darin England, Jon B. Weissman
141
Voted
ICFP
2003
ACM
16 years 2 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
CCS
2007
ACM
15 years 8 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
119
Voted
CCS
2009
ACM
16 years 3 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong