Sciweavers

1393 search results - page 221 / 279
» Virtual-Channel Flow Control
Sort
View
135
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 2 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
CN
1999
154views more  CN 1999»
15 years 2 months ago
Architectural Considerations in the Design of WDM-Based Optical Access Networks
We describe a WDM-based optical access network architecture for providing broadband Internet services. The architecture uses a passive collection and distribution network and a co...
Eytan Modiano, Richard A. Barry
TON
2002
109views more  TON 2002»
15 years 2 months ago
Coordinated multihop scheduling: a framework for end-to-end services
In multi-hop networks, packet schedulers at downstream nodes have an opportunity to make up for excessive latencies due to congestion at upstream nodes. Similarly, when packets inc...
Chengzhi Li, Edward W. Knightly
109
Voted
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 21 days ago
Computer Aided Design Modeling for Heterogeneous Objects
Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not conta...
Vikas Gupta, K. S. Kasana, Puneet Tandon
SC
2009
ACM
15 years 9 months ago
Exploring many task computing in scientific workflows
One of the main advantages of using a scientific workflow management system (SWfMS) to orchestrate data flows among scientific activities is to control and register the whole work...
Eduardo S. Ogasawara, Daniel de Oliveira, Fernando...