Sciweavers

571 search results - page 50 / 115
» From Control Flow to Dataflow
Sort
View
ACSAC
2009
IEEE
14 years 23 days ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ATAL
2010
Springer
13 years 10 months ago
A systematic agent framework for situated autonomous systems
We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the information f...
Frederic Py, Kanna Rajan, Conor McGann
SOSP
2009
ACM
14 years 5 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
INFOCOM
2003
IEEE
14 years 2 months ago
Flow Level Simulation of Large IP Networks
— The aim of this paper is to simulate the interaction of a large number of TCP controlled flows and UDP flows sharing many routers/links, from the knowledge of the network par...
François Baccelli, Dohy Hong
ISCC
2003
IEEE
152views Communications» more  ISCC 2003»
14 years 2 months ago
Dynamic Fair Queuing (DFQ): A Novel Fair Scheduler Improving Wireless Transmission over Hybrid LANs
Local area network (LAN) will be a hybrid network that includes wired and wireless links together. Nonetheless, the wired hosts always take the most bandwidth and bring about the ...
Ce-Kuen Shieh, Yu-Ben Miao, Ming-Qi Shieh, Wen-Shy...