Sciweavers

1477 search results - page 156 / 296
» Token flow control
Sort
View
CCR
2005
96views more  CCR 2005»
13 years 10 months ago
A protocol for packet network intercommunication
-- A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packe...
Vinton G. Cerf, Robert E. Kahn
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 7 months ago
Trust-Based Data Disclosure in Sensor Networks
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level sche...
Efthimia Aivaloglou, Stefanos Gritzalis
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 10 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
DSOM
2003
Springer
14 years 3 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
14 years 2 months ago
Evolving distributed agents for managing air traffic
Air traffic management offers an intriguing real world challenge to designing large scale distributed systems using evolutionary computation. The ability to evolve effective air t...
Adrian K. Agogino, Kagan Tumer