Sciweavers

1587 search results - page 52 / 318
» Access Control for Shared Resources
Sort
View
DSD
2008
IEEE
136views Hardware» more  DSD 2008»
14 years 4 months ago
Network Interface Sharing Techniques for Area Optimized NoC Architectures
Although preliminary analysis frameworks point out the performance speed-ups achievable by on-chip networks with respect to state-of-the-art interconnects, the area concern remain...
Alberto Ferrante, Simone Medardoni, Davide Bertozz...
IOR
2010
94views more  IOR 2010»
13 years 7 months ago
Utility-Maximizing Resource Control: Diffusion Limit and Asymptotic Optimality for a Two-Bottleneck Model
We study a stochastic network that consists of two servers shared by two classes of jobs. Class 1 jobs require a concurrent occupancy of both servers while class 2 jobs use one se...
Heng-Qing Ye, David D. Yao
STTT
2008
134views more  STTT 2008»
13 years 9 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
CSCW
2002
ACM
13 years 9 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf
TWC
2008
87views more  TWC 2008»
13 years 9 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang