Sciweavers

TDSC
2011
13 years 6 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
MST
2011
200views Hardware» more  MST 2011»
13 years 6 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
ICPPW
2009
IEEE
13 years 9 months ago
Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks
Vehicular Delay-Tolerant Networks (VDTNs) are an application of the Delay-Tolerant Network (DTN) concept, where the movement of vehicles and their message relaying service is used ...
Vasco Nuno da Gama de Jesus Soares, Joel Jos&eacut...
FLAIRS
2009
13 years 9 months ago
Lifting the Limitations in a Rule-based Policy Language
The predicates that are used to encode a planning domain in PDDL often do not include concepts that are important for effectively reasoning about problems in the domain. In partic...
Alan Lindsay, Maria Fox, Derek Long
FIW
2009
163views Communications» more  FIW 2009»
13 years 9 months ago
Detecting policy conflicts by model checking UML state machines
Policies are convenient means to modify system behaviour at run-time. Nowadays, policies are created in great numbers by different actors, ranging from system administrators to lay...
Maurice H. ter Beek, Stefania Gnesi, Carlo Montang...
TRUSTBUS
2010
Springer
13 years 9 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
SEMWEB
2010
Springer
13 years 9 months ago
OWL-POLAR: Semantic Policies for Agent Reasoning
Abstract. Policies are declarations of constraints on the behaviour of components within distributed systems, and are often used to capture norms within agent-based systems. A few ...
Murat Sensoy, Timothy J. Norman, Wamberto Weber Va...
SEMWEB
2010
Springer
13 years 9 months ago
A Self-Policing Policy Language
Abstract. Formal policies allow the non-ambiguous definition of situations in which usage of certain entities are allowed, and enable the automatic evaluation whether a situation i...
Sebastian Speiser, Rudi Studer
IEEECIT
2010
IEEE
13 years 9 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
CSREAESA
2010
13 years 9 months ago
Customizable and Predictable Synchronization in a Component-Based OS
Component-based operating systems enable embedded systems to adapt system policies, mechanisms, and abstractions to the specific workloads and contexts of each system. The scope o...
Gabriel Parmer, Jiguo Song