Sciweavers

470 search results - page 22 / 94
» From evidence-based policy making to policy analytics
Sort
View
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
14 years 5 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
NSPW
2004
ACM
14 years 4 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 4 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
PODC
2004
ACM
14 years 4 months ago
Mechanism design for policy routing
The Border Gateway Protocol (BGP) for interdomain routing is designed to allow autonomous systems (ASes) to express policy preferences over alternative routes. We model these pref...
Joan Feigenbaum, Rahul Sami, Scott Shenker
TMC
2010
178views more  TMC 2010»
13 years 9 months ago
Cost Analysis of Short Message Retransmissions
Short Message Service (SMS) is the most popular mobile data service today. In Taiwan, a subscriber sends more than 200 short messages per year on average. The huge demand for SMS ...
Sok-Ian Sou, Yi-Bing Lin, Chao-Liang Luo