Sciweavers

200 search results - page 39 / 40
» A Core Calculus for Provenance
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 1 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
SIGCOMM
2005
ACM
14 years 1 months ago
Declarative routing: extensible routing with declarative queries
The Internet’s core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior researc...
Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, ...
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 23 days ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
EMSOFT
2008
Springer
13 years 9 months ago
Portioned EDF-based scheduling on multiprocessors
This paper presents an EDF-based algorithm, called Earliest Deadline Deferrable Portion (EDDP), for efficient scheduling of recurrent real-time tasks on multiprocessor systems. Th...
Shinpei Kato, Nobuyuki Yamasaki
IMAMS
2007
245views Mathematics» more  IMAMS 2007»
13 years 9 months ago
Discrete Surface Ricci Flow: Theory and Applications
Conformal geometry is in the core of pure mathematics. Conformal structure is more flexible than Riemaniann metric but more rigid than topology. Conformal geometric methods have p...
Miao Jin, Junho Kim, Xianfeng David Gu