Sciweavers

914 search results - page 16 / 183
» Effective vaccination policies
Sort
View
CN
2004
103views more  CN 2004»
13 years 7 months ago
Providing end-to-end service level agreements across multiple ISP networks
Due to the autonomous nature of ISPs, the service level agreement (SLA) offering is currently confined to within a single provider network. In this work, we examine some methods o...
Panita Pongpaibool, Hyong S. Kim
AMMA
2009
Springer
14 years 1 months ago
Impact of Misalignment of Trading Agent Strategy across Multiple Markets
We examine the effect of a market pricing policy designed to attract high-valued traders in a multiple market context using JCAT software. Our experiments show that a simple change...
Jung-woo Sohn, Sooyeon Lee, Tracy Mullen
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ASPLOS
2004
ACM
14 years 23 days ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
CSE
2009
IEEE
13 years 5 months ago
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Abstract--A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of a...
Michele Barletta, Silvio Ranise, Luca Viganò...