Sciweavers

785 search results - page 84 / 157
» A Calculus for Trust Management
Sort
View
SISW
2005
IEEE
14 years 2 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
JIKM
2002
104views more  JIKM 2002»
13 years 8 months ago
Implementing KM in an Information Technology Environment: a Practical Approach
The emergence of knowledge-based organisations has seen an emphasis shift to recognising people as the prime competitive asset and the push of management to nurture social capital...
Jayakrishnan Balachandran, Schubert Foo
RTSS
2009
IEEE
14 years 3 months ago
Adaptive Dynamic Power Management for Hard Real-Time Systems
Abstract—Power dissipation has constrained the performance boosting of modern computer systems in the past decade. Dynamic power management has been widely applied to change the ...
Kai Huang, Luca Santinelli, Jian-Jia Chen, Lothar ...
FIW
2007
123views Communications» more  FIW 2007»
13 years 10 months ago
Composing Features by Managing Inconsistent Requirements
Abstract. One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferri...
Robin C. Laney, Thein Than Tun, Michael Jackson, B...
SIGUCCS
1999
ACM
14 years 1 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry