Sciweavers

893 search results - page 103 / 179
» Environment Assumptions for Synthesis
Sort
View
ISW
2004
Springer
14 years 1 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
LCN
2003
IEEE
14 years 1 months ago
Measuring the Impact of Slow User Motion on Packet Loss and Delay over IEEE 802.11b Wireless Links
IEEE 802.11b compliant WLAN technology is increasingly used for cordless telephone services. Often, a WLAN phone is moved during a call. In the present paper we explore to what ex...
Christian Hoene, André Günther, Adam W...
SACMAT
2003
ACM
14 years 1 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
DASFAA
2010
IEEE
189views Database» more  DASFAA 2010»
14 years 28 days ago
Peer-to-Peer Similarity Search Based on M-Tree Indexing
Similarity search in metric spaces has several important applications both in centralized and distributed environments. In centralized applications, such as similarity-based image ...
Akrivi Vlachou, Christos Doulkeridis, Yannis Kotid...
DATE
2002
IEEE
86views Hardware» more  DATE 2002»
14 years 23 days ago
A Layered, Codesign Virtual Machine Approach to Modeling Computer Systems
By using a macro/micro state model we show how assumptions on the resolution of logical and physical timing of computation in computer systems has resulted in design methodologies...
JoAnn M. Paul, Donald E. Thomas