In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the essential optimisation problem formulated. The complexity of exact and sophistic...
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
The IEEE 802.11 standard for medium access control in wireless local area networks has been adopted as the de-facto medium access control standard in multi-hop wireless networks. I...
Several studies have demonstrated that out-of-order execution processors may not be the most adequate organization for wide issue processors due to the increasing penalties that w...