Sciweavers

1406 search results - page 34 / 282
» Information Flow in Systems with Schedulers
Sort
View
ICTAC
2005
Springer
14 years 1 months ago
On Typing Information Flow
Abstract. We investigate the issue of typing confidentiality in a languagebased information-flow security approach, aiming at improving some previously proposed type systems, esp...
Gérard Boudol
ITNG
2008
IEEE
14 years 2 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
ORL
1998
68views more  ORL 1998»
13 years 7 months ago
A fast bipartite network flow algorithm for selective assembly
Bipartite network flow problems naturally arise in applications such as selective assembly and preemptive scheduling. This paper presents fast algorithms for these problems that ...
Satoru Iwata, Tomomi Matsui, S. Thomas McCormick
WWW
2007
ACM
14 years 8 months ago
Identifying and discriminating between web and peer-to-peer traffic in the network core
Traffic classification is the ability to identify and categorize network traffic by application type. In this paper, we consider the problem of traffic classification in the netwo...
Jeffrey Erman, Anirban Mahanti, Martin F. Arlitt, ...
CSFW
1996
IEEE
13 years 11 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi