Sciweavers

2517 search results - page 97 / 504
» Specifying Weak Sets
Sort
View
PODC
1996
ACM
15 years 9 months ago
Fail-Awareness in Timed Asynchronous Systems
We address the problem of the impossibility of implementing synchronous fault-tolerant service specifications in asynchronous distributed systems. We introduce a method for weaken...
Christof Fetzer, Flaviu Cristian
CCS
2006
ACM
15 years 9 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
HYBRID
2000
Springer
15 years 9 months ago
Modular Specification of Hybrid Systems in CHARON
Abstract. We propose a language, called Charon, for modular specification of interacting hybrid systems. For hierarchical description of the system architecture, Charon supports bu...
Rajeev Alur, Radu Grosu, Yerang Hur, Vijay Kumar, ...
CCS
2008
ACM
15 years 7 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
MMNS
2007
124views Multimedia» more  MMNS 2007»
15 years 6 months ago
Empirical Effective Bandwidth Estimation for IPTV Admission Control
We propose an admission control approach for IPTV in which decisions to admit new flows are based on effective bandwidth estimates calculated using empirical traffic measurement. W...
Alan Davy, Dmitri Botvich, Brendan Jennings