The desire for exible networking services has given rise to the concept of active networks." Active networks provide a general framework for designing and implementing network...
D. Scott Alexander, William A. Arbaugh, Angelos D....
Design by Contract is a design methodology that promotes software reliability and reusability by requiring each component module to have a well-specified interface and leaves a mo...
Phillip L. Nico, Clark Savage Turner, Kimberly Kno...
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Data collection, or uploading, is an inherent part of numerous digital government applications. In this poster we present our recent research directions in the development of Bist...
William C. Cheng, Leslie Cheung, Cheng-Fu Chou, Le...