Sciweavers

3979 search results - page 103 / 796
» Wild control operators
Sort
View
WSC
2001
14 years 11 months ago
Fluid model for window-based congestion control mechanism
We study the stability of two queueing delay-based congestion control algorithms, the (p, 1)-proportionally fair algorithm and the global optimization algorithm. We linearize the ...
Richard J. La
CSREASAM
2006
14 years 11 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp
IJCAI
2001
14 years 11 months ago
Adaptive Control of Acyclic Progressive Processing Task Structures
The progressive processing model allows a system to trade off resource consumption against the quality of the outcome by mapping each activity to a graph of potential solution met...
Stéphane Cardon, Abdel-Illah Mouaddib, Shlo...
SOSP
1997
ACM
14 years 11 months ago
A Decentralized Model for Information Flow Control
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Andrew C. Myers, Barbara Liskov
FAST
2009
14 years 7 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...