Sciweavers

6192 search results - page 1054 / 1239
» Distributed Control of Attention
Sort
View
POLICY
2001
Springer
15 years 8 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
PROMS
2001
Springer
170views Multimedia» more  PROMS 2001»
15 years 8 months ago
GCAP: A New Multimedia Multicast Architecture for QoS
Despite its obvious suitability for distributed multimedia applications, multicasting has not yet found widespread application. Having analyzed shortcomings of today's approac...
Michel Diaz, Roberto Canonico, Luis Costa, Serge F...
ACSAC
2000
IEEE
15 years 8 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
ICC
2000
IEEE
153views Communications» more  ICC 2000»
15 years 8 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
ICNP
2000
IEEE
15 years 8 months ago
Coordinated Network Scheduling: A Framework for End-to-End Services
In multi-hop networks, packet schedulers at downstream nodes have an opportunity to make up for excessive latencies due to congestion at upstream nodes. Similarly, when packets in...
Chengzhi Li, Edward W. Knightly
« Prev « First page 1054 / 1239 Last » Next »