Sciweavers

914 search results - page 54 / 183
» Effective vaccination policies
Sort
View
138
Voted
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 10 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
98
Voted
DSRT
1999
IEEE
15 years 4 months ago
Resolving Concurrent Interactions
Serialization, the traditional method of resolving concurrent interactions, is often inappropriate; when interactions are dependent on each other, other policies for resolving the...
Anand Natrajan, Paul F. Reynolds Jr.
AUSAI
2009
Springer
15 years 7 months ago
Experimental Market Mechanism Design for Double Auction
In this paper, we introduce an experimental approach to the design, analysis and implementation of market mechanisms based on double auction. We define a formal market model that ...
Masabumi Furuhata, Laurent Perrussel, Jean-Marc Th...
EUROPAR
2007
Springer
15 years 6 months ago
Starvation-Free Transactional Memory-System Protocols
Abstract. Transactional memory systems trade ease of programming with runtime performance losses in handling transactions. This paper focuses on starvation effects that show up in ...
M. M. Waliullah, Per Stenström
101
Voted
IFIP
2009
Springer
14 years 10 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta