Sciweavers

1440 search results - page 114 / 288
» Third-Party Flow Control
Sort
View
JCM
2006
89views more  JCM 2006»
15 years 4 months ago
A Premium Traffic Management in DiffServ Through End-to-End Delay Budget Partitioning
Our novel Call Admission Control (CAC) scheme [1], [2] determines the number of Expedited Forwarding (EF) (Premium) flows accepted, based on e2e available bandwidth measurement. Ho...
Hamada Alshaer, Eric Horlait
ICAC
2005
IEEE
15 years 10 months ago
FEEDBACKFLOW-An Adaptive Workflow Generator for Systems Management
FeedbackFlow is a framework that implements a general closed control loop of planning – execution result validation – re-planning, and generates workflows. In this article, we...
Artur Andrzejak, Ulf Hermann, Akhil Sahai
ENTCS
2008
114views more  ENTCS 2008»
15 years 4 months ago
Term-graph Rewriting in Tom Using Relative Positions
In this paper, we present the implementation in Tom of a de Bruijn indices generalization allowing the representation of term-graphs over an algebraic signature. By adding pattern...
Emilie Balland, Paul Brauner
CSFW
2007
IEEE
15 years 8 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...