Sciweavers

2031 search results - page 364 / 407
» On Tree-Constrained Matchings and Generalizations
Sort
View
CCS
2004
ACM
14 years 3 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
ESA
2004
Springer
145views Algorithms» more  ESA 2004»
14 years 3 months ago
Flows on Few Paths: Algorithms and Lower Bounds
Abstract. Classical network flow theory allows decomposition of flow into several chunks of arbitrary sizes traveling through the network on different paths. In the first part ...
Maren Martens, Martin Skutella
CHI
2010
ACM
14 years 3 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
INFOCOM
2003
IEEE
14 years 3 months ago
Input Queued Switches: Cell Switching vs. Packet Switching
— Input Queued(IQ) switches have been very well studied in the recent past. The main problem in the IQ switches concerns scheduling. The main focus of the research has been the ...
Yashar Ganjali, Abtin Keshavarzian, Devavrat Shah
SIGMETRICS
2003
ACM
165views Hardware» more  SIGMETRICS 2003»
14 years 3 months ago
A hybrid systems modeling framework for fast and accurate simulation of data communication networks
In this paper we present a general hybrid systems modeling framework to describe the flow of traffic in communication networks. To characterize network behavior, these models use...
Stephan Bohacek, João P. Hespanha, Junsoo L...