Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Type enforcement

Known as: TE, Type enforcement architecture 
The concept of type enforcement (TE) in the field of information technology is related to access control. Implementing TE gives priority to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Networks are critical for the security of many computer systems. However, their complex and asynchronous nature often renders it… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Today record levels of funding are being invested in enforcement and antipoaching measures to tackle the “war on poaching,” but… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper shows that the effects of employment protection critically depend on its enforcement. For this purpose, we capture… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper, a new fast technique of passivity enforcement of a nonpassive rational model is introduced. The technique disturbs… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper addresses some issues related to the passivity of interconnect macromodels computed from measured or simulated port… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
A wireless network of remotely located, self-powered video sensors must make efficient use of limited network capacity and power… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Today, over 50,000 international treaties are in force, covering nearly every aspect of international affairs and nearly every… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Introduction 1. The Just War: The origins of humanitarian intervention 2. The Scourge of War: Humanitarian intervention and the… Expand
Is this relevant?
1996
1996
Abstract The lack of a proper enforcement mechanism for sovereign debt generates a commitment failure. As a result, a sovereign… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Type enforcement is a table-oriented mandatory access control mechanism well-suited for confining applications and restricting… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?