Sciweavers

213 search results - page 25 / 43
» Managing access and flow control requirements in distributed...
Sort
View
PLDI
2006
ACM
15 years 6 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
90
Voted
PDP
2003
IEEE
15 years 5 months ago
A multi-tiered agent-based architecture for a cooperative learning environment
: In this paper the problem of educational resource management in a cooperative learning environment is discussed. A task model was elaborated to determine both functional and leve...
Eduardo Sánchez Vila, Manuel Lama, Ricardo ...
ICMCS
1997
IEEE
142views Multimedia» more  ICMCS 1997»
15 years 4 months ago
A Rate Allocation Policy with MCR/PCR Support and Distributed ABR Implementation Using Explicit Rate Feedback
An important concept in the available bit rate (ABR) service model as defined by the ATM Forum is the minimum cell rate (MCR) guarantee as well as the peak cell rate (PCR) constra...
Yiwei Thomas Hou, Henry H.-Y. Tzeng, Shivendra S. ...
DEON
2008
Springer
15 years 2 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
110
Voted
MOBISYS
2008
ACM
16 years 1 days ago
Micro power management of active 802.11 interfaces
Wireless interfaces are major power consumers on mobile systems. Considerable research has improved the energy efficiency of elongated idle periods or created more elongated idle ...
Jiayang Liu, Lin Zhong