Sciweavers

11909 search results - page 23 / 2382
» The Scheme Programming Language
Sort
View
IFIP
2010
Springer
13 years 3 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
CC
2007
Springer
126views System Software» more  CC 2007»
14 years 2 months ago
An Array Allocation Scheme for Energy Reduction in Partitioned Memory Architectures
This paper presents a compiler technique that reduces the energy consumption of the memory subsystem, for an off-chip partitioned memory architecture having multiple memory banks ...
K. Shyam, R. Govindarajan
IFIP
2004
Springer
14 years 2 months ago
Low-Latency Non-predictive Handover Scheme in Mobile IPv6 Environments
In IP-based wireless/mobile networks, minimizing handover latency is one of the most important issues. Fast handover mobile IPv6 (FMIPv6) reduces the handover latency by handover p...
Geunhyung Kim, Cheeha Kim
CL
1999
Springer
13 years 8 months ago
Optimizing floating point operations in Scheme
It is well known that dynamic typing in languages like Lisp is costly in terms of performance. Besides the cost of tag checking, the other major source of ine ciency comes from th...
W. F. Wong
IFIP
2004
Springer
14 years 2 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci