Sciweavers

1477 search results - page 39 / 296
» Token flow control
Sort
View
MMNS
2007
105views Multimedia» more  MMNS 2007»
14 years 13 days ago
Monitoring Flow Aggregates with Controllable Accuracy
In this paper, we show the feasibility of real-time flow monitoring with controllable accuracy in today’s IP networks. Our approach is based on Netflow and A-GAP. A-GAP is a prot...
Alberto Gonzalez Prieto, Rolf Stadler
CASES
2004
ACM
14 years 4 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
ICESS
2007
Springer
14 years 5 months ago
Handling Control Data Flow Graphs for a Tightly Coupled Reconfigurable Accelerator
In an embedded system including a base processor integrated with a tightly coupled accelerator, extracting frequently executed portions of the code (hot portion) and executing thei...
Hamid Noori, Farhad Mehdipour, Morteza Saheb Zaman...
CSREASAM
2009
14 years 2 days ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
CDC
2008
IEEE
108views Control Systems» more  CDC 2008»
14 years 1 months ago
A link between Riemann invariants and frequency domain approaches for boundary control of open channel flow
Open channel flow is traditionally described by hyperbolic conservation laws (the Saint-Venant equations), that can be controlled using boundary conditions. For horizontal friction...
Xavier Litrico, Vincent Fromion