Sciweavers

635 search results - page 34 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
CIDR
2011
274views Algorithms» more  CIDR 2011»
12 years 11 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
IPPS
2002
IEEE
14 years 16 days ago
Implementing Associative Search and Responder Resolution
In a paper presented last year at WMPP’01 [Walker01], we described the initial prototype of an associative processor implemented using field-programmable logic devices (FPLDs). ...
Meiduo Wu, Robert A. Walker, Jerry L. Potter
SIMUTOOLS
2008
13 years 9 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
14 years 21 days ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
ICDCSW
2003
IEEE
14 years 27 days ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra