Sciweavers

19003 search results - page 173 / 3801
» We Need Assurance!
Sort
View
SRDS
1999
IEEE
14 years 2 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...
RAID
1999
Springer
14 years 2 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
SIGCOMM
1998
ACM
14 years 2 months ago
Scalable QoS Provision Through Buffer Management
In recent years, a number of link scheduling algorithms have been proposed that greatly improve upon traditional FIFO scheduling in being able to assure rate and delay bounds for ...
Roch Guérin, Sanjay Kamat, Vinod G. J. Peri...
EUROMICRO
1997
IEEE
14 years 2 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
LACL
1998
Springer
14 years 2 months ago
Strict Compositionality and Literal Movement Grammars
Abstract. The principle of compositionality, as standardly defined, regards grammars as compositional that are not compositional in an intuitive sense of the word. There is, for ex...
Marcus Kracht