Sciweavers

2488 search results - page 441 / 498
» Distributed Non-binary Constraints
Sort
View
JCS
2008
69views more  JCS 2008»
15 years 2 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
ITA
2006
163views Communications» more  ITA 2006»
15 years 2 months ago
Graph fibrations, graph isomorphism, and PageRank
PageRank is a ranking method that assigns scores to web pages using the limit distribution of a random walk on the web graph. A fibration of graphs is a morphism that is a local i...
Paolo Boldi, Violetta Lonati, Massimo Santini, Seb...
JSAC
2008
139views more  JSAC 2008»
15 years 2 months ago
A Game-Theoretic Framework for Medium Access Control
In this paper, we generalize the random access game model, and show that it provides a general game-theoretic framework for designing contention based medium access control. We ext...
Tao Cui, Lijun Chen, Steven H. Low
JCM
2006
104views more  JCM 2006»
15 years 2 months ago
CLog: Low Cost Gigabit Full Packet Logging
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
EJIS
2007
115views more  EJIS 2007»
15 years 2 months ago
Towards agent-oriented model-driven architecture
Model-Driven Architecture (MDA) supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represen...
Liang Xiao 0002, Des Greer