Sciweavers

70 search results - page 10 / 14
» Network Access Control Interoperation using Semantic Web Tec...
Sort
View
TON
2008
138views more  TON 2008»
14 years 9 months ago
On the performance benefits of multihoming route control
Multihoming is increasingly being employed by large enterprises and data centers to extract good performance and reliability from their ISP connections. Multihomed end networks tod...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
ICFP
2005
ACM
15 years 9 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
BMCBI
2008
140views more  BMCBI 2008»
14 years 10 months ago
GORouter: an RDF model for providing semantic query and inference services for Gene Ontology and its associations
Background: The most renowned biological ontology, Gene Ontology (GO) is widely used for annotations of genes and gene products of different organisms. However, there are shortcom...
Qingwei Xu, Yixiang Shi, Qiang Lu, Guo-qing Zhang,...
PDPTA
2004
14 years 11 months ago
Service Oriented Web Based Meta Resource Sharing Platform - The CBWeB Portal
Grid computing and cluster computing platforms are becoming the primary development platforms for pervasive computing. The primary problem associated with both computational grids...
Avinash Shankar, Daniel Saffioti, Ian Piper, Ashwi...
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud