We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Abstract—The pervasiveness of complex communication services and the need for end-users to play a greater role in developing communication services have resulted in the creation ...
Yingbo Wang, Yali Wu, Andrew A. Allen, Barbara Esp...
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
This paper presents a distributed planning and control architecture for autonomous Multi-Manipulator Systems (MMS). The control architecture is implemented using an agent-based ap...
Juan C. Fraile, Christiaan J. J. Paredis, Pradeep ...
Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests serv...