Sciweavers

294 search results - page 46 / 59
» Conflict Analysis for Management Policies
Sort
View
CISS
2008
IEEE
14 years 2 months ago
Appropriate control of wireless networks with flow level dynamics
Abstract— We consider the network control problem for wireless networks with flow level dynamics under the general k-hop interference model. In particular, we investigate the co...
Long Le, Ravi R. Mazumdar
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
SIGCSE
2009
ACM
179views Education» more  SIGCSE 2009»
14 years 8 months ago
Methods, metrics and motivation for a green computer science program
Computer science educators are uniquely positioned to promote greater awareness of Green Computing, using the academic setting to encourage environmentally conscious use of techno...
Mujtaba Talebi, Thomas Way
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
14 years 22 days ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
IJNM
2008
103views more  IJNM 2008»
13 years 7 months ago
An efficient architecture for Bandwidth Brokers in DiffServ networks
In this article we examine the architecture of an entity used for automatic management and provisioning of resources for DiffServ networks. We examine the existing literature and ...
Christos Bouras, Kostas Stamos