Sciweavers

1082 search results - page 126 / 217
» Policy support for call control
Sort
View
ESORICS
2009
Springer
14 years 22 days ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
TCS
2010
13 years 7 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
SBACPAD
2006
IEEE
147views Hardware» more  SBACPAD 2006»
14 years 2 months ago
Controlling the Power and Area of Neural Branch Predictors for Practical Implementation in High-Performance Processors
Neural-inspired branch predictors achieve very low branch misprediction rates. However, previously proposed implementations have a variety of characteristics that make them challe...
Daniel A. Jiménez, Gabriel H. Loh
INFOCOM
2005
IEEE
14 years 2 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
SYNTHESE
2011
88views more  SYNTHESE 2011»
13 years 3 months ago
Saving the intuitions: polylithic reference
: My main aim in this paper is to clarify the concepts of referential success and of referential continuity that are so crucial to the scientific realism debate. I start by conside...
Ioannis Votsis