Sciweavers

118 search results - page 8 / 24
» A Computational Approach to Pocklington Certificates in Type...
Sort
View
DAGSTUHL
2001
13 years 10 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 7 months ago
An Economic-based Resource Management and Scheduling for Grid Computing Applications
Resource management and scheduling plays a crucial role in achieving high utilization of resources in grid computing environments. Due to heterogeneity of resources, scheduling an...
G. Murugesan, C. Chellappan
ACMICEC
2006
ACM
148views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
Web based information for product ranking in e-business: a fuzzy approach
In this paper we have introduced a methodology to rank the available products in the Internet market. These rankings are based on the customers’ own preferences and also on the ...
B. K. Mohanty, K. Passi
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 9 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
MST
2008
150views more  MST 2008»
13 years 8 months ago
Coinduction for Exact Real Number Computation
This paper studies coinductive representations of real numbers by signed digit streams and fast Cauchy sequences. It is shown how the associated coinductive principle can be used ...
Ulrich Berger, Tie Hou