Sciweavers

4445 search results - page 796 / 889
» Reflective Authorization Systems
Sort
View
136
Voted
AIPS
2003
15 years 5 months ago
Decision-Theoretic Group Elevator Scheduling
We present an efficient algorithm for exact calculation and minimization of expected waiting times of all passengers using a bank of elevators. The dynamics of the system are rep...
Daniel Nikovski, Matthew Brand
148
Voted
CMS
2003
171views Communications» more  CMS 2003»
15 years 5 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
142
Voted
LISA
2003
15 years 5 months ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why it...
Deepak Giridharagopal
175
Voted
SEC
2003
15 years 5 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
114
Voted
DOCENG
2010
ACM
15 years 4 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky