Sciweavers

4350 search results - page 678 / 870
» Case studies for contract-based systems
Sort
View
123
Voted
AOSD
2010
ACM
15 years 10 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
151
Voted
CCS
2010
ACM
15 years 10 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
143
Voted
MUM
2009
ACM
251views Multimedia» more  MUM 2009»
15 years 10 months ago
WiMo: location-based emotion tagging
In this paper we introduce WiMo, a location-based social networking tool that enables users to share and store their emotional feelings about places. WiMo creates a mobile social ...
Ruturaj N. Mody, Katharine S. Willis, Roland Kerst...
EVOW
2009
Springer
15 years 10 months ago
Swarm Intelligence Inspired Multicast Routing: An Ant Colony Optimization Approach
Abstract. The advancement of network induces great demands on a series of applications such as the multicast routing. This paper firstly makes a brief review on the algorithms in ...
Xiaomin Hu, Jun Zhang, Li-Ming Zhang
146
Voted
CSE
2009
IEEE
15 years 10 months ago
A Design Methodology for Self-Management in Distributed Environments
—Autonomic computing is a paradigm that aims at reducing administrative overhead by providing autonomic managers to make applications self-managing. In order to better deal with ...
Ahmad Al-Shishtawy, Vladimir Vlassov, Per Brand, S...