Sciweavers

1062 search results - page 148 / 213
» Models and Languages for Overlay Networks
Sort
View
133
Voted
B
2007
Springer
15 years 7 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
120
Voted
CN
2006
106views more  CN 2006»
15 years 3 months ago
Efficient large-scale BGP simulations
Simulation has been the method of choice for analyzing large, complex, and highly volatile systems. One of these systems is the inter-domain routing infrastructure of the Internet...
Xenofontas A. Dimitropoulos, George F. Riley
91
Voted
IJMBL
2010
84views more  IJMBL 2010»
15 years 21 days ago
JAMIOLAS 3.0: Supporting Japanese Mimicry and Onomatopoeia Learning Using Sensor Data
: In this paper, we propose an improved context-aware system for supporting to learning Japanese mimicry and onomatopoeia (MIO) using sensor data. In our two previous studies, we p...
Bin Hou, Hiroaki Ogata, Masayuki Miyata, Mengmeng ...
NN
2006
Springer
232views Neural Networks» more  NN 2006»
15 years 3 months ago
A probabilistic model of gaze imitation and shared attention
An important component of language acquisition and cognitive learning is gaze imitation. Infants as young as one year of age can follow the gaze of an adult to determine the objec...
Matthew W. Hoffman, David B. Grimes, Aaron P. Shon...
128
Voted
SOSP
2009
ACM
16 years 9 days ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...