Sciweavers

131 search results - page 23 / 27
» Incorporating Trust in Network Virtualization
Sort
View
NDSS
2003
IEEE
15 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
IDA
2010
Springer
14 years 8 months ago
Multi-dimensional data construction method with its application to learning from small-sample-sets
Insufficient training data is one of the major problems in neural network learning, because it leads to poor learning performance. In order to enhance an intelligent learning proc...
Hsiao-Fan Wang, Chun-Jung Huang
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ATC
2010
Springer
14 years 8 months ago
Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace
Co-Space refers to interactive virtual environment modelled after the real world we are situated in. Through realistic 3D modelling and animation technologies, Co-Space simulates t...
Ah-Hwee Tan, Yilin Kang
INFOCOM
1993
IEEE
15 years 1 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager