Sciweavers

2116 search results - page 117 / 424
» Resource Analysis by Sup-interpretation
Sort
View
109
Voted
IANDC
2008
140views more  IANDC 2008»
15 years 3 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
139
Voted
RTAS
2010
IEEE
15 years 2 months ago
Reservation-Based Interrupt Scheduling
Abstract—Some real-time kernels (such as a recent realtime version of Linux) permit to execute interrupt handlers in dedicated threads, to control their interference on realtime ...
Nicola Manica, Luca Abeni, Luigi Palopoli
120
Voted
ACL
2010
15 years 1 months ago
Rebanking CCGbank for Improved NP Interpretation
Once released, treebanks tend to remain unchanged despite any shortcomings in their depth of linguistic analysis or coverage of specific phenomena. Instead, separate resources are...
Matthew Honnibal, James R. Curran, Johan Bos
173
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Truthful prioritization schemes for spectrum sharing
Abstract—As the rapid expansion of smart phones and associated data-intensive applications continues, we expect to see renewed interest in dynamic prioritization schemes as a way...
Victor Shnayder, Jeremy Hoon, David C. Parkes, Vik...
105
Voted
CCS
2007
ACM
15 years 9 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia