Sciweavers

5723 search results - page 927 / 1145
» Network Management
Sort
View
SAC
2009
ACM
15 years 11 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
133
Voted
ICS
2009
Tsinghua U.
15 years 11 months ago
Towards 100 gbit/s ethernet: multicore-based parallel communication protocol design
Ethernet line rates are projected to reach 100 Gbits/s by as soon as 2010. While in principle suitable for high performance clustered and parallel applications, Ethernet requires ...
Stavros Passas, Kostas Magoutis, Angelos Bilas
COMPSAC
2009
IEEE
15 years 11 months ago
Real-Time Guarantees in Flexible Advance Reservations
—This paper deals with the problem of scheduling workflow applications with Quality of Service (QoS) constraints, comprising real-time and interactivity constraints, over a servi...
Kleopatra Konstanteli, Dimosthenis Kyriazis, Theod...
149
Voted
DSN
2009
IEEE
15 years 11 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman
NDSS
2009
IEEE
15 years 11 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...