Sciweavers

685 search results - page 83 / 137
» Implementing Controlled Languages in GF
Sort
View
179
Voted
SIGCOMM
2012
ACM
13 years 6 days ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
IEEEARES
2007
IEEE
15 years 4 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
GMAI
2006
IEEE
144views Solid Modeling» more  GMAI 2006»
15 years 3 months ago
Manipulation of Elastically Deformable Surfaces through Maya Plug-in
In this paper, we develop a mathematical model from the theory of plate bending in elasticity which relates physical properties of a surface to its elastic deformation. We present...
Lihua You, Javier Romero Rodriguez, Jian J. Zhang
SPLC
2008
14 years 11 months ago
Feature Descriptions for Context-oriented Programming
In Context-oriented Programming (COP), programs can be partitioned into behavioral variations expressed as sets of partial program definitions. Such layers can be activated and de...
Pascal Costanza, Theo D'Hondt
POLICY
2009
Springer
15 years 4 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...