Sciweavers

1393 search results - page 191 / 279
» Virtual-Channel Flow Control
Sort
View
DRM
2009
Springer
15 years 11 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
WISA
2007
Springer
15 years 11 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
COORDINATION
2005
Springer
15 years 10 months ago
Coordination Systems in Role-Based Adaptive Software
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...
Alan W. Colman, Jun Han
138
Voted
DATE
2010
IEEE
163views Hardware» more  DATE 2010»
15 years 9 months ago
Efficient High-Level modeling in the networking domain
-- Starting Electronic System Level (ESL) design flows with executable High-Level Models (HLMs) has the potential to sustainably improve productivity. However, writing good HLMs fo...
Christian Zebelein, Joachim Falk, Christian Haubel...
INFOCOM
1999
IEEE
15 years 9 months ago
Inter-Class Resource Sharing using Statistical Service Envelopes
Networks that support multiple services through "link-sharing" must address the fundamental conflicting requirement between isolation among service classes to satisfy ea...
Jingyu Qiu, Edward W. Knightly