Sciweavers

565 search results - page 96 / 113
» A logic for authorization provenance
Sort
View
TCS
2002
13 years 8 months ago
Set-sharing is redundant for pair-sharing
Although the usual goal of sharing analysis is to detect which pairs of variables share, the standard choice for sharing analysis is a domain that characterizes set-sharing. In th...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
NETWORKS
2007
13 years 8 months ago
Vertex disjoint routings of cycles over tori
We study the problem of designing a survivable WDM network based on covering the communication requests with subnetworks that are protected independently from each other. We consi...
Jean-Claude Bermond, Min-Li Yu
SAC
2008
ACM
13 years 8 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...
HUC
2010
Springer
13 years 7 months ago
EnergyLife: pervasive energy awareness for households
We present Energy Life a system utilizing wireless sensors, mobile and ambient interfaces that turn energy consumers into active players. Energy Life participants play through dif...
Christoffer Björkskog, Giulio Jacucci, Lucian...
CNSM
2010
13 years 7 months ago
Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains
Abstract--Change Management, a core process of the Information Technology Infrastructure Library (ITIL), is concerned with the management of changes to IT infrastructure and servic...
Sebastian Hagen, Alfons Kemper