Sciweavers

670 search results - page 48 / 134
» A RBAC-Based Policy Information Base
Sort
View
WISA
2007
Springer
14 years 4 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
IPCO
2004
107views Optimization» more  IPCO 2004»
14 years 4 days ago
A Robust Optimization Approach to Supply Chain Management
Abstract. We propose a general methodology based on robust optimization to address the problem of optimally controlling a supply chain subject to stochastic demand in discrete time...
Dimitris Bertsimas, Aurélie Thiele
ETFA
2005
IEEE
14 years 4 months ago
LEF closed-loop scheduling policy for real-time control systems
Today there is a significant body of results of resource management in real-time systems. However, most of them are based on "open-loop" strategies and techniques that do...
J. Yepez, Pau Martí, J. Ayza, Josep M. Fuer...
IPPS
2006
IEEE
14 years 4 months ago
Empowering a helper cluster through data-width aware instruction selection policies
Narrow values that can be represented by less number of bits than the full machine width occur very frequently in programs. On the other hand, clustering mechanisms enable cost- a...
Osman S. Unsal, Oguz Ergin, Xavier Vera, Antonio G...
SECON
2008
IEEE
14 years 5 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...