One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
We define the class of SMART scheduling policies. These are policies that bias towards jobs with small remaining service times, jobs with small original sizes, or both, with the ...
Adam Wierman, Mor Harchol-Balter, Takayuki Osogami
We investigate the behaviour of load-adaptive rerouting policies in the Wardrop model where decisions must be made on the basis of stale information. In this model, an infinite n...
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
—Multi-channel operation in wireless systems has been proposed to increase user throughput and reduce transmission delays. However, multi-channel operation requires adequate reso...
— Web servers are exposed to extremely changing runtime requirements. Going offline to adjust policies and configuration parameters in order to cope with such requirements is n...
Wasif Gilani, Julio Sincero, Olaf Spinczyk, Wolfga...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) has resulted in the presence of very descriptive privacy policies on healthcare websites. These policies ar...
Julia Brande Earp, Matthew W. Vail, Annie I. Ant&o...
Abstract— We investigate adaptive modulation using the network utility maximization framework. We derive new crosslayer optimal power and rate adaptation policies for several pra...
Daniel O'Neill, Andrea J. Goldsmith, Stephen P. Bo...