Sciweavers

452 search results - page 45 / 91
» Is home network application acceptable or not
Sort
View
OSDI
2006
ACM
14 years 9 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
JASIS
2006
108views more  JASIS 2006»
13 years 8 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
INFOCOM
2005
IEEE
14 years 2 months ago
Network localization in partially localizable networks
— Knowing the positions of the nodes in a network is essential to many next generation pervasive and sensor network functionalities. Although many network localization systems ha...
David Kiyoshi Goldenberg, Arvind Krishnamurthy, W....
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
14 years 3 months ago
Improving QoS guarantees through implicit AC
—In multiservice networks, admission control (AC) is a convenient means of assuring high quality communications by safeguarding enough availability for customer traffic. This ca...
Solange Rito Lima, Pedro Sousa, Paulo Carvalho
CP
2003
Springer
14 years 1 months ago
Semi-automatic Modeling by Constraint Acquisition
Constraint programming is a technology which is now widely used to solve combinatorial problems in industrial applications. However, using it requires considerable knowledge and e...
Remi Coletta, Christian Bessière, Barry O'S...