Sciweavers

630 search results - page 56 / 126
» Acceptable internet use policy
Sort
View
HICSS
2010
IEEE
130views Biometrics» more  HICSS 2010»
14 years 2 months ago
On the Reliability of Software Piracy Statistics
Despite tremendous debate and policy interest in software piracy, the accuracy of piracy statistics compiled by the Business Software Alliance (BSA) has been accepted at face valu...
Ivan P. L. Png
ECRTS
2003
IEEE
14 years 1 months ago
Evaluation of New POSIX Real-Time Operating Systems Services for Small Embedded Platforms
1 : The ongoing revision of the POSIX.13 standard —real-time profiles for portable operating system interfaces— proposes adding new services to the Minimum RealTime System Prof...
Mario Aldea Rivas, Michael González Harbour
ACJ
2006
85views more  ACJ 2006»
13 years 7 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
IDMS
2001
Springer
116views Multimedia» more  IDMS 2001»
14 years 4 days ago
The Minimal Buffering Requirements of Congestion Controlled Interactive Multimedia Applications
This paper uses analysis and experiments to study the minimal buffering requirements of congestion controlled multimedia applications. Applications in the Internet must use congest...
Kang Li, Charles Krasic, Jonathan Walpole, Molly H...
ICDCS
2010
IEEE
13 years 11 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...