Sciweavers

3764 search results - page 54 / 753
» Design and Implementation of Performance Policies for SMS Sy...
Sort
View
USENIX
1994
13 years 10 months ago
A Better Update Policy
y-filled data block results in a delayed write,Abstract while a modification that fills a block results in an immediate, although asynchronous, write. TheSome file systems can dela...
Jeffrey C. Mogul
FLOPS
2006
Springer
14 years 11 days ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
FORTE
2011
13 years 6 days ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
ENTCS
2006
113views more  ENTCS 2006»
13 years 8 months ago
The Role of Back-Pressure in Implementing Latency-Insensitive Systems
Back-pressure is a logical mechanism to control the flow of information on a communication channel of a latency-insensitive system (LIS) while guaranteeing that no packet is lost....
Luca P. Carloni
POLICY
2004
Springer
14 years 2 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...