Sciweavers

224 search results - page 34 / 45
» Policy Specification for Programmable Networks
Sort
View
CCS
2009
ACM
15 years 10 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
POPL
2008
ACM
15 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ANCS
2005
ACM
15 years 3 months ago
A novel reconfigurable hardware architecture for IP address lookup
IP address lookup is one of the most challenging problems of Internet routers. In this paper, an IP lookup rate of 263 Mlps (Million lookups per second) is achieved using a novel ...
Hamid Fadishei, Morteza Saheb Zamani, Masoud Sabae...
ISADS
2003
IEEE
15 years 2 months ago
A GUI Approach to Programming of TMO Frames and Design of Real-Time Distributed Computing Software
An advanced high-level approach for programming of real-time distributed computing applications, the TMO (Time-triggered Message-triggered Object) programming and specification sc...
K. H. Kim, Seok-Joong Kang
WMCSA
2002
IEEE
15 years 2 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...