Sciweavers

1440 search results - page 227 / 288
» Third-Party Flow Control
Sort
View
120
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 15 days ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
95
Voted
CN
1999
154views more  CN 1999»
15 years 8 days ago
Architectural Considerations in the Design of WDM-Based Optical Access Networks
We describe a WDM-based optical access network architecture for providing broadband Internet services. The architecture uses a passive collection and distribution network and a co...
Eytan Modiano, Richard A. Barry
82
Voted
TON
2002
109views more  TON 2002»
15 years 7 days ago
Coordinated multihop scheduling: a framework for end-to-end services
In multi-hop networks, packet schedulers at downstream nodes have an opportunity to make up for excessive latencies due to congestion at upstream nodes. Similarly, when packets inc...
Chengzhi Li, Edward W. Knightly
CORR
2010
Springer
166views Education» more  CORR 2010»
14 years 11 months ago
Computer Aided Design Modeling for Heterogeneous Objects
Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not conta...
Vikas Gupta, K. S. Kasana, Puneet Tandon
SC
2009
ACM
15 years 7 months ago
Exploring many task computing in scientific workflows
One of the main advantages of using a scientific workflow management system (SWfMS) to orchestrate data flows among scientific activities is to control and register the whole work...
Eduardo S. Ogasawara, Daniel de Oliveira, Fernando...