Sciweavers

1769 search results - page 83 / 354
» An implementation of argument based discussion
Sort
View
112
Voted
CCS
2010
ACM
15 years 11 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
HASE
2007
IEEE
15 years 11 months ago
Design of a Fairness Guarantee Mechanism Based on Network Measurement
In this paper we discuss the problem of network fairness. Traditional network fairness focuses on treating uneven resource (such as bandwidth) allocation in TCP congestion control...
Xin Wang, Xiaochen Zhang, Shuang Yang, Xiangyang X...
125
Voted
ICC
2007
IEEE
15 years 11 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
127
Voted
ICPP
2007
IEEE
15 years 11 months ago
Automatic Trace-Based Parallelization of Java Programs
We propose and evaluate a novel approach for automatic parallelization. The approach uses traces as units of parallel work. We discuss the benefits and challenges of the use of t...
Borys J. Bradel, Tarek S. Abdelrahman
IFIP
2007
Springer
15 years 10 months ago
A Framework for QoS Contract Negotiation in Component-Based Applications
The support of QoS properties in component-based software requires the run-time selection of appropriate concrete QoS contracts at the ports of the interacting components. Such a s...
Mesfin Mulugeta, Alexander Schill