Sciweavers

2572 search results - page 470 / 515
» codes 2008
Sort
View
136
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 2 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SAC
2008
ACM
15 years 2 months ago
A remote display system for Java-based mobile applications
Remote presentation is an interesting model for executing applications in mobile devices, since applications can be executed on a server and their interfaces displayed on mobile c...
Andre Luiz Camargos Tavares, Marco Tulio de Olivei...
245
Voted
AWPN
2008
311views Algorithms» more  AWPN 2008»
15 years 4 months ago
WoPeD 2.0 goes BPEL 2.0
WoPeD (Workflow Petrinet Designer) is an easy-to-use, Java-based open source software tool being developed at the University of Cooperative Education, Karlsruhe. WoPeD is able to e...
Andreas Eckleder, Thomas Freytag
117
Voted
JCSS
2008
81views more  JCSS 2008»
15 years 2 months ago
A simulator for adaptive parallel applications
Dynamically allocating computing nodes to parallel applications is a promising technique for improving the utilization of cluster resources. Detailed simulations can help identify...
Basile Schaeli, Sebastian Gerlach, Roger D. Hersch
134
Voted
TWC
2008
99views more  TWC 2008»
15 years 2 months ago
Robust transmit processing for frequency-selective fading channels with imperfect channel feedback
Reliable channel state information at the transmitter (CSIT) can improve the throughput of wireless networks significantly. In a realistic scenario, there is a mismatch between th...
Christof Jonietz, Wolfgang H. Gerstacker, Robert S...