Sciweavers

3624 search results - page 650 / 725
» Abstract Algebraic Logic
Sort
View
CSFW
2005
IEEE
14 years 3 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
ICDE
2005
IEEE
125views Database» more  ICDE 2005»
14 years 3 months ago
QoSMig: Adaptive Rate-Controlled Migration of Bulk Data in Storage Systems
Abstract— Logical reorganization of data and requirements of differentiated QoS in information systems necessitate bulk data migration by the underlying storage layer. Such data ...
Koustuv Dasgupta, Sugata Ghosal, Rohit Jain, Upend...
ISCAS
2005
IEEE
154views Hardware» more  ISCAS 2005»
14 years 3 months ago
HIBI-based multiprocessor SoC on FPGA
Abstract — FPGAs offer excellent platform for System-onChips consisting of Intellectual Property (IP) blocks. The problem is that IP blocks and their interconnections are often F...
Erno Salminen, Ari Kulmala, Timo D. Hämä...
SAINT
2005
IEEE
14 years 3 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
TIME
2005
IEEE
14 years 3 months ago
LOLA: Runtime Monitoring of Synchronous Systems
Abstract— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitori...
Ben D'Angelo, Sriram Sankaranarayanan, Césa...