Sciweavers

739 search results - page 98 / 148
» Information Flow in Credential Systems
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...
JOLLI
2008
98views more  JOLLI 2008»
13 years 7 months ago
Meaning and Dialogue Coherence: A Proof-theoretic Investigation
Abstract. This paper presents a novel proof-theoretic account of dialogue coherfocuses on an abstract class of cooperative information-oriented dialogues and describes how their st...
Paul Piwek
ICUMT
2009
13 years 5 months ago
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...
ISN
1999
Springer
159views Communications» more  ISN 1999»
13 years 12 months ago
Accounting Management in a TINA-Based Service and Network Environment
The ACTS FlowThru project aims to build a management system which supports the flow of management information across organisational and technological domains by reusing components ...
Patrick Hellemans, Cliff Redmond, Koen Daenen, Dav...
DAC
2006
ACM
14 years 8 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...