Sciweavers

200 search results - page 13 / 40
» An Update from VisWeek 2009
Sort
View
POLICY
2009
Springer
14 years 2 months ago
Strong and Weak Policy Relations
—Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language ...
Michael J. May, Carl A. Gunter, Insup Lee, Steve Z...
WOWMOM
2009
ACM
130views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Interference aware route optimization with predicted network conditions
The basic idea presented in this paper is to use interference aware routing with predicted interference. Noise and other values are measured over a long time and within a wide are...
Till Wollenberg, Thomas Mundt
HPCC
2009
Springer
14 years 5 days ago
C2Cfs: A Collective Caching Architecture for Distributed File Access
—In this paper we present C2Cfs - a decentralized collective caching architecture for distributed filesystems. C2Cfs diverges from the traditional client-server model and advoca...
Andrey Ermolinskiy, Renu Tewari
FPGA
2009
ACM
285views FPGA» more  FPGA 2009»
14 years 2 months ago
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions
PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Johnny Tsung Lin Ho, Guy G. Lemieux
IWSOS
2009
Springer
14 years 2 months ago
Self-organization of Internet Paths
The Internet consists of a constantly evolving complex hierarchical architecture where routers are grouped into autonomous systems (ASes) that interconnect to provide global connec...
Tom Kleiberg, Piet Van Mieghem