Sciweavers

1082 search results - page 198 / 217
» Policy support for call control
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 2 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
SAC
2005
ACM
14 years 2 months ago
A case study of separation of duty properties in the context of the Austrian "eLaw" process
Over the last few years rapid progress has been made in moving from conceptual studies, “whitepapers” and initiatives to the actual deployment of e-Government systems [13]. In...
Andreas Schaad, Pascal Spadone, Helmut Weichsel
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
14 years 1 months ago
A New Buffer Management Scheme for Multimedia Terminals in Broadband Satellite Networks
In the recent years, there has been a growing interest in broadband satellite networks. Broadband satellite networks are designed to provide the required qualify of service (QoS) ...
Mahnoosh Mobasseri, Victor C. M. Leung
TON
2008
107views more  TON 2008»
13 years 8 months ago
On guaranteed smooth switching for buffered crossbar switches
Scalability considerations drive the evolution of switch design from output queueing to input queueing and further to combined input and crosspoint queueing (CICQ). However, CICQ s...
Simin He, Shutao Sun, Hong-Tao Guan, Qiang Zheng, ...
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
11 years 11 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr