Sciweavers

2486 search results - page 137 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
EEE
2005
IEEE
14 years 2 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
DEBS
2008
ACM
13 years 10 months ago
Speculative out-of-order event processing with software transaction memory
In event stream applications, events flow through a network of components that perform various types of operations, e.g., filtering, aggregation, transformation. When the operatio...
Andrey Brito, Christof Fetzer, Heiko Sturzrehm, Pa...
PERVASIVE
2007
Springer
14 years 3 months ago
Explorations and Experiences with Ambient Information Systems
We have developed a series of ambient information systems and used each in our research lab for extended periods of time. The systems use technologies such as RFID, RSS, and Phidg...
John T. Stasko, Myungcheol Doo, Brian Dorn, Christ...
CIA
1998
Springer
14 years 1 months ago
Multiagent Systems in Information-Rich Environments
Information-rich environments are the open environments that characterize most of the modern applications of computing technology. The applications include ubiquitous information a...
Michael N. Huhns, Munindar P. Singh
ICDCS
2008
IEEE
14 years 3 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...