Sciweavers

706 search results - page 99 / 142
» Configuration Management
Sort
View
CCS
2008
ACM
13 years 10 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
IESA
2007
13 years 10 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
LREC
2008
130views Education» more  LREC 2008»
13 years 10 months ago
COLDIC, a Lexicographic Platform for LMF compliant lexica
Despite of the importance of lexical resources for a number of NLP applications (Machine Translation, Information Extraction, Event Detection and Tracking, Question Answering, amo...
Núria Bel, Sergio Espeja, Montserrat Marimo...
NETWORKING
2000
13 years 10 months ago
A Reliable Subcasting Protocol for Wireless Environments
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these...
Djamel Fawzi Hadj Sadok, Carlos de M. Cordeiro, Ju...
SIGCOMM
2010
ACM
13 years 9 months ago
Autonomous traffic engineering with self-configuring topologies
Network operators use traffic engineering (TE) to control the flow of traffic across their networks. Existing TE methods require manual configuration of link weights or tunnels, w...
Srikanth Sundaresan, Cristian Lumezanu, Nick Feams...