Sciweavers

533 search results - page 76 / 107
» Control flow based obfuscation
Sort
View
SACMAT
2005
ACM
15 years 8 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
CAMP
2005
IEEE
15 years 8 months ago
A Plug-and-Play Architecture for Cognitive Video Stream Analysis
— This paper presents an architecture for cognitive analysis of streaming video, in which a new module can easily be plugged in, to add to or even compete with existing functiona...
Thor List, José Bins, Robert B. Fisher, Dav...
129
Voted
SAC
2004
ACM
15 years 8 months ago
Web Services: separation of concerns: computation coordination communication
The purpose of this paper is to investigate the use of a new concept in component communication, expressed by the channel based coordination language called ρέω, in the coordina...
Theophilos A. Limniotes, George A. Papadopoulos, F...
130
Voted
EUROMICRO
1998
IEEE
15 years 6 months ago
Process Scheduling for Performance Estimation and Synthesis of Hardware/Software Systems
The paper presents an approach to process scheduling for embedded systems. Target architectures consist of several processors and ASICs connected by shared busses. We have develop...
Petru Eles, Krzysztof Kuchcinski, Zebo Peng, Alexa...
ISN
2000
Springer
158views Communications» more  ISN 2000»
15 years 6 months ago
Load Balancing for a Distributed CORBA-Based SCP
This paper examines load balancing issues relating to a distributed CORBA-based Service Control Point. Two types of load balancing strategies are explored through simulation studie...
Conor McArdle, Niklas Widell, Christian Nyberg, Er...