Sciweavers

2711 search results - page 506 / 543
» Stochastic Hybrid Systems: Application to Communication Netw...
Sort
View
CCS
2006
ACM
14 years 12 days ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
ICDE
2006
IEEE
181views Database» more  ICDE 2006»
14 years 10 months ago
Adaptive Reorganization of Coherency-Preserving Dissemination Tree for Streaming Data
In many recent applications, data are continuously being disseminated from a source to a set of servers. In this paper, we propose a cost-based approach to construct dissemination...
Yongluan Zhou, Beng Chin Ooi, Kian-Lee Tan, Feng Y...
CCS
2009
ACM
14 years 9 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
GLOBECOM
2007
IEEE
14 years 3 months ago
A Scalable Bloom Filter for Membership Queries
—Bloom filters allow membership queries over sets with allowable errors. It is widely used in databases, networks and distributed systems and it has great potential for distribut...
Kun Xie, Yinghua Min, Dafang Zhang, Jigang Wen, Ga...
GLOBECOM
2006
IEEE
14 years 2 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar