Sciweavers

653 search results - page 89 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
GECCO
2009
Springer
130views Optimization» more  GECCO 2009»
14 years 3 months ago
Liposome logic
VLSI research, in its continuous push toward further miniaturisation, is seeking to break through the limitations of current circuit manufacture techniques by moving towards biomi...
James Smaldon, Natalio Krasnogor, Alexander Camero...
ASPLOS
2012
ACM
12 years 4 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
ADHOCNETS
2010
Springer
13 years 7 months ago
Sensorium - An Active Monitoring System for Neighborhood Relations in Wireless Sensor Networks
Communication neighborhood in wireless sensor networks changes often as links break or appear. Therefore, monitoring link quality and (logical) network topology is necessary. As no...
Stefan Nürnberger, Reinhardt Karnapke, Jö...
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
14 years 9 months ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure