Sciweavers

739 search results - page 102 / 148
» Information Flow in Credential Systems
Sort
View
ADVIS
2000
Springer
14 years 1 days ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
13 years 11 months ago
On the Design and Verification Methodology of the Look-Aside Interface
In this paper, we present a technique to design and verify the Look-Aside (LA-1) Interface standard used in network processors. Our design flow includes several refinements starti...
Ali Habibi, Asif Iqbal Ahmed, Otmane Aït Moha...
CAISE
2008
Springer
13 years 9 months ago
A Work Allocation Language with Soft Constraints
Today's business process orchestration languages such as WS-BPEL and BPML have high-level constructs for specifying flow of control and data, but facilities for allocating ta...
Christian Stefansen, Sriram K. Rajamani, Parameswa...
CCS
2010
ACM
13 years 8 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
BIOSTEC
2008
192views Healthcare» more  BIOSTEC 2008»
13 years 9 months ago
Application of Process Mining in Healthcare - A Case Study in a Dutch Hospital
Abstract. To gain competitive advantage, hospitals try to streamline their processes. In order to do so, it is essential to have an accurate view of the "careflows" under...
R. S. Mans, Helen Schonenberg, Minseok Song, Wil M...