Sciweavers

1477 search results - page 5 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
VLDB
2007
ACM
116views Database» more  VLDB 2007»
14 years 7 months ago
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases
Databases are increasingly being used to store information covered by heterogeneous policies, which require support for access control with great flexibility. This has led to incr...
Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa...
DAC
2009
ACM
14 years 8 months ago
Evaluating design trade-offs in customizable processors
The short time-to-market window for embedded systems demands automation of design methodologies for customizable processors. Recent research advances in this direction have mostly...
Unmesh D. Bordoloi, Huynh Phung Huynh, Samarjit Ch...
4OR
2006
118views more  4OR 2006»
13 years 7 months ago
Dealing with inconsistent judgments in multiple criteria sorting models
Sorting models consist in assigning alternatives evaluated on several criteria to ordered categories. To implement such models it is necessary to set the values of the preference p...
Vincent Mousseau, Luis C. Dias, José Rui Fi...
CCS
2004
ACM
14 years 25 days ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
IPPS
1998
IEEE
13 years 11 months ago
An Architecture for Network Resource Monitoring in a Distributed Environment
As part of its HiPer-D Program, the United States Navy is developing an experimental distributed system which achieves survivability by dynamically reconfiguring the system using ...
Philip M. Irey IV, Robert W. Hott, David T. Marlow