Sciweavers

183 search results - page 27 / 37
» Safety analysis of usage control authorization models
Sort
View
SODA
2010
ACM
160views Algorithms» more  SODA 2010»
14 years 6 months ago
Solving Simple Stochastic Tail Games
Stochastic games are a natural model for open reactive processes: one player represents the controller and his opponent represents a hostile environment. The evolution of the syste...
Hugo Gimbert, Florian Horn
INFOCOM
1998
IEEE
14 years 25 days ago
TCP Fast Recovery Strategies: Analysis and Improvements
This paper suggests that, to match an ideal Internet gateway which rigorously enforces fair sharing among competing TCP connections, an ideal TCP sender should possess two propert...
Dong Lin, H. T. Kung
CHI
2005
ACM
14 years 9 months ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
WSC
1997
13 years 10 months ago
Collision Awareness Multiple Access Networks Performance Optimization
Collision awareness (CA) multiple access networks include the carrier sense multiple access (CSMA), ALOHA, and Ethernet networks. In order to maximize throughput with minimum netw...
Paul T. R. Wang, Yoon K. Hong
SIGCPR
2000
ACM
173views Hardware» more  SIGCPR 2000»
14 years 28 days ago
Hollywood: a business model for the future?
This paper elucidates an emergent theory of organizational structure, process and leadership which the author believes will characterize the Internet based workplace of the future...
Charles E. Grantham