Sciweavers

2572 search results - page 470 / 515
» codes 2008
Sort
View
121
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 21 days ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SAC
2008
ACM
15 years 8 days ago
A remote display system for Java-based mobile applications
Remote presentation is an interesting model for executing applications in mobile devices, since applications can be executed on a server and their interfaces displayed on mobile c...
Andre Luiz Camargos Tavares, Marco Tulio de Olivei...
AWPN
2008
311views Algorithms» more  AWPN 2008»
15 years 2 months ago
WoPeD 2.0 goes BPEL 2.0
WoPeD (Workflow Petrinet Designer) is an easy-to-use, Java-based open source software tool being developed at the University of Cooperative Education, Karlsruhe. WoPeD is able to e...
Andreas Eckleder, Thomas Freytag
JCSS
2008
81views more  JCSS 2008»
15 years 23 days ago
A simulator for adaptive parallel applications
Dynamically allocating computing nodes to parallel applications is a promising technique for improving the utilization of cluster resources. Detailed simulations can help identify...
Basile Schaeli, Sebastian Gerlach, Roger D. Hersch
117
Voted
TWC
2008
99views more  TWC 2008»
15 years 20 days ago
Robust transmit processing for frequency-selective fading channels with imperfect channel feedback
Reliable channel state information at the transmitter (CSIT) can improve the throughput of wireless networks significantly. In a realistic scenario, there is a mismatch between th...
Christof Jonietz, Wolfgang H. Gerstacker, Robert S...