Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Gunter, Carl A. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  An integrated architecture for demand response communications and control
LeMay M., Nelli R., Gross G., Gunter C.  Hawaii international conference on system sciences (Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences,Jan 7-10, 2008) 1742008.  Type: Proceedings

As energy prices increase, new paradigms for energy-saving measures are being explored. This paper describes a control system to minimize energy cost when the price of that energy varies dynamically. First, the authors outline key issu...
...
Dec 3 2008  
  Defeasible security policy composition for Web services
Lee A., Boyer J., Olson L., Gunter C.  Formal methods in security (Proceedings of the Fourth ACM Workshop on Formal Methods in Security, Alexandria, Virginia, Nov 3, 2006) 45-54, 2006.  Type: Proceedings

Defeasible logic is a rule-based nonmonotonic logic that is now being used in the design of applications in areas where specifications are naturally expressed in terms of rules. The application investigated in this paper—...
...
Feb 8 2007  
  Reasoning about secrecy for active networks
Kakkar P., Gunter C., Abadi M. Journal of Computer Security 11(2): 245-287, 2003.  Type: Article

In an internetwork context, an active network is one where chunks of mobile code, carried in packets, can be executed at routers, as well as at hosts. This can cause security-relevant changes in services, and in resources like routing ...
...
Oct 20 2003  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy