Sciweavers

807 search results - page 79 / 162
» Term Rewriting for Access Control
Sort
View
123
Voted
VTC
2007
IEEE
15 years 10 months ago
Uplink VoIP Support for 3GPP EUTRA
—Evolved UTRA (EUTRA) is currently under study by 3GPP standards organizations as a long term evolution (LTE) for current generation Universal Terrestrial Radio Access (UTRA) net...
Ravi Nory, Ravi Kuchibhotla, Robert Love, Yakun Su...
168
Voted
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 9 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
150
Voted
PLDI
2003
ACM
15 years 8 months ago
Automatically proving the correctness of compiler optimizations
We describe a technique for automatically proving compiler optimizations sound, meaning that their transformations are always semantics-preserving. We first present a domainspeci...
Sorin Lerner, Todd D. Millstein, Craig Chambers
SACMAT
2010
ACM
15 years 8 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
144
Voted
TII
2008
169views more  TII 2008»
15 years 3 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet