Sciweavers

12301 search results - page 2035 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
NDSS
2003
IEEE
15 years 10 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
165
Voted
ICDCSW
2002
IEEE
15 years 10 months ago
Subscription Summaries for Scalability and Efficiency in Publish/Subscribe Systems
A key issue when designing and implementing largescale publish/subscribe systems is how to efficiently propagate subscriptions among the brokers of the system. Brokers require thi...
Peter Triantafillou, Andreas A. Economides
161
Voted
POLICY
2001
Springer
15 years 9 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
CONEXT
2007
ACM
15 years 9 months ago
Router buffer sizing revisited: the role of the output/input capacity ratio
The issue of router buffer sizing is still open and significant. Previous work either considers open-loop traffic or only analyzes persistent TCP flows. This paper differs in two ...
Ravi S. Prasad, Constantine Dovrolis, Marina Thott...
151
Voted
GI
2009
Springer
15 years 8 months ago
Parallelised Gaussian Mixture Filtering for Vehicular Traffic Flow Estimation
: Large traffic network systems require handling huge amounts of data, often distributed over a large geographical region in space and time. Centralised processing is not then the ...
Lyudmila Mihaylova, Amadou Gning, Viktor Doychinov...
« Prev « First page 2035 / 2461 Last » Next »