Sciweavers

757 search results - page 41 / 152
» Composing Security-Aware Software
Sort
View
COMPSAC
2006
IEEE
15 years 8 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
105
Voted
COMPSAC
2006
IEEE
15 years 8 months ago
QoS-Based Service Composition
QoS has been one of the major challenges in Web Services area. Though negotiated in the contract, service quality usually can not be guaranteed by providers. Therefore, the servic...
Jinchun Xia
PODC
2010
ACM
15 years 6 months ago
Brief announcement: view transactions: transactional model with relaxed consistency checks
We present view transactions, a model for relaxed consistency checks in software transactional memory (STM). View transactions always operate on a consistent snapshot of memory bu...
Yehuda Afek, Adam Morrison, Moran Tzafrir
ASPDAC
2001
ACM
86views Hardware» more  ASPDAC 2001»
15 years 6 months ago
Development of PPRAM-link interface (PLIF) IP core for high-speed inter-SoC communication
Abstract-- We are proposing "PPRAM-Link": a new highspeed communication standard for merged-DRAM/logic SoC architecture. PPRAM-Link standard is composed of physical/logic...
Takanori Okuma, Koji Hashimoto, Kazuaki Murakami
FSTTCS
2000
Springer
15 years 6 months ago
Combining Semantics with Non-standard Interpreter Hierarchies
This paper reports on results concerning the combination of non-standard semantics via interpreters. We define what a semantics combination means and identify under which condition...
Sergei M. Abramov, Robert Glück