Sciweavers

3121 search results - page 510 / 625
» Information Survivability Control Systems
Sort
View
EUROSYS
2009
ACM
16 years 1 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
SOSP
2001
ACM
16 years 1 months ago
Mesh Based Content Routing using XML
We have developed a new approach for reliably multicasting timecritical data to heterogeneous clients over mesh-based overlay networks. To facilitate intelligent content pruning, ...
Alex C. Snoeren, Kenneth Conley, David K. Gifford
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
15 years 11 months ago
Collision avoidance in dynamic environments: An ICS-based solution and its comparative evaluation
Abstract— This paper presents ICS-AVOID, a collision avoidance scheme based upon the concept of Inevitable Collision State (ICS), ie a state for which, no matter what the future ...
Luis Martinez-Gomez, Thierry Fraichard
SAINT
2006
IEEE
15 years 10 months ago
Fluid-Based Analysis of a Network with DCCP Connections and RED Routers
In this paper, we model DCCP congestion control mechanism and RED as independent discrete-time systems using fluid-flow approximation. By interconnecting DCCP connections and RE...
Hiroyuki Hisamatsu, Hiroyuki Ohsaki, Masayuki Mura...
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...