Sciweavers

1879 search results - page 201 / 376
» Extending Reflective Architectures
Sort
View
MMMACNS
2001
Springer
15 years 8 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
HPCA
2000
IEEE
15 years 8 months ago
Flit-Reservation Flow Control
This paper presents flit-reservation flow control, in which control flits traverse the network in advance of data flits, reserving buffers and channel bandwidth. Flit-reservation ...
Li-Shiuan Peh, William J. Dally
AAIM
2007
Springer
97views Algorithms» more  AAIM 2007»
15 years 8 months ago
Efficiency of Data Distribution in BitTorrent-Like Systems
BitTorrent (BT) in practice is a very efficient method to share data over a network of clients. In this paper we extend the recent work of Arthur and Panigrahy [1] on modelling the...
Ho-Leung Chan, Tak Wah Lam, Prudence W. H. Wong
AOSD
2007
ACM
15 years 8 months ago
SCoPE: an AspectJ compiler for supporting user-defined analysis-based pointcuts
This paper proposes an approach called SCoPE, which supports user-defined analysis-based pointcuts in aspect-oriented programming (AOP) languages. The advantage of our approach is...
Tomoyuki Aotani, Hidehiko Masuhara
ECRIME
2007
15 years 8 months ago
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...