Sciweavers

2940 search results - page 89 / 588
» Behavioral Constraints for Services
Sort
View
SJ
2010
116views more  SJ 2010»
13 years 8 months ago
A Scheduler for Unsolicited Grant Service (UGS) in IEEE 802.16e Mobile WiMAX Networks
Most of the IEEE 802.16e Mobile WiMAX scheduling proposals for real-time traffic using Unsolicited Grant Service (UGS) focus on the throughput and guaranteed latency. The delay jit...
Chakchai So-In, Raj Jain, Abdel Karim Al Tamimi
UM
2005
Springer
14 years 3 months ago
Constraint-Sensitive Privacy Management for Personalized Web-Based Systems
This research aims at reconciling web personalization with privacy constraints imposed by legal restrictions and by users’ privacy preferences. We propose a software product line...
Yang Wang 0005
IASTEDSE
2004
13 years 11 months ago
Conflict checking of separation of duty constraints in RBAC - implementation experiences
Separation of duty constraints define mutual exclusion relations between two entities (e.g. two permissions). Thus, a software component that supports the definition of separation...
Mark Strembeck
ICCBSS
2005
Springer
14 years 3 months ago
Specifying Interaction Constraints of Software Components for Better Understandability and Interoperability
A vital issue in the correct use of commercial-off-the-shelf (COTS) components is the proper understanding of their functionality, quality attributes and ways of operation. Traditi...
Yan Jin, Jun Han
HPDC
2010
IEEE
13 years 11 months ago
Resource provisioning with budget constraints for adaptive applications in cloud environments
The recent emergence of clouds is making the vision of utility computing realizable, i.e. computing resources and services can be delivered, utilized, and paid for as utilities su...
Qian Zhu, Gagan Agrawal