Sciweavers

6110 search results - page 1192 / 1222
» Graceful Network Operations
Sort
View
123
Voted
SACMAT
2010
ACM
15 years 5 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
92
Voted
ICS
2010
Tsinghua U.
15 years 5 months ago
Large-scale FFT on GPU clusters
A GPU cluster is a cluster equipped with GPU devices. Excellent acceleration is achievable for computation-intensive tasks (e.g. matrix multiplication and LINPACK) and bandwidth-i...
Yifeng Chen, Xiang Cui, Hong Mei
ICRE
2000
IEEE
15 years 4 months ago
Scenario Evolution: A Closer View on Relationships
In this article we show the results of an extensive research on scenario evolution. We investigated twelve case studies spanning over 200 scenarios that contained over 800 episode...
Karin Breitman, Julio Cesar Sampaio do Prado Leite
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 4 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
« Prev « First page 1192 / 1222 Last » Next »