Sciweavers

194 search results - page 17 / 39
» I-RMI: Performance Isolation in Information Flow Application...
Sort
View
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ER
2000
Springer
114views Database» more  ER 2000»
13 years 11 months ago
From Web Sites to Web Applications: New Issues for Conceptual Modeling
Abstract E-commerce, web-based booking systems, and on-line auction systems are only a few examples that demonstrate how WWW sites are evolving from hypermedia information reposito...
Luciano Baresi, Franca Garzotto, Paolo Paolini
CASES
2008
ACM
13 years 9 months ago
Control flow optimization in loops using interval analysis
We present a novel loop transformation technique, particularly well suited for optimizing embedded compilers, where an increase in compilation time is acceptable in exchange for s...
Mohammad Ali Ghodrat, Tony Givargis, Alex Nicolau
CIA
2000
Springer
13 years 12 months ago
Towards Information Agent Interoperability
Abstract. Currently, many kinds of information agents for di erent purposes exist. However, agents from di erent systems are still unable to cooperate, even if they accurately foll...
Stefan Haustein, Sascha Lüdecke
SIGCOMM
1999
ACM
13 years 12 months ago
Load-Sensitive Routing of Long-Lived IP Flows
Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic pa...
Anees Shaikh, Jennifer Rexford, Kang G. Shin