Sciweavers

4604 search results - page 748 / 921
» Concurrency in Synchronous Systems
Sort
View
129
Voted
CSE
2009
IEEE
15 years 10 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
DSN
2009
IEEE
15 years 10 months ago
VNsnap: Taking snapshots of virtual networked environments with minimal downtime
A virtual networked environment (VNE) consists of virtual machines (VMs) connected by a virtual network. It has been adopted to create “virtual infrastructures” for individual...
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu
165
Voted
SIES
2009
IEEE
15 years 10 months ago
Programmable temporal isolation through variable-bandwidth servers
—We introduce variable-bandwidth servers (VBS) for scheduling and executing processes under programmable temporal isolation. A VBS is an extension of a constant-bandwidth server ...
Silviu S. Craciunas, Christoph M. Kirsch, Hannes P...
IPPS
2009
IEEE
15 years 10 months ago
Core-aware memory access scheduling schemes
Multi-core processors have changed the conventional hardware structure and require a rethinking of system scheduling and resource management to utilize them efficiently. However, ...
Zhibin Fang, Xian-He Sun, Yong Chen, Surendra Byna
128
Voted
ICFEM
2009
Springer
15 years 10 months ago
Modeling and Analysis of Thread-Pools in an Industrial Communication Platform
Thread pools are often used as a pattern to increase the throughput and responsiveness of software systems. Implementations of thread pools may differ considerably from each other...
Frank S. de Boer, Immo Grabe, Mohammad Mahdi Jagho...