Sciweavers

2116 search results - page 226 / 424
» Resource Analysis by Sup-interpretation
Sort
View
FAC
2010
107views more  FAC 2010»
15 years 3 months ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
NOMS
2010
IEEE
228views Communications» more  NOMS 2010»
15 years 2 months ago
DA VINCI: A tool to improve VoIP call routing configurations
As IP telephony becomes a critical part of the enterprise network infrastructure, there is an increasing need for tools to help manage VoIP systems. In this paper, we introduce DA ...
Kunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae
ICSE
2009
IEEE-ACM
15 years 2 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
INFOCOM
2012
IEEE
13 years 7 months ago
A tale of three CDNs: An active measurement study of Hulu and its CDNs
— We study the Hulu online video service via active measurements. It is known that Hulu utilizes multiple CDNs to serve users’ video requests. The focus of this study is on how...
Vijay Kumar Adhikari, Yang Guo, Fang Hao, Volker H...
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 6 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...