Sciweavers

136 search results - page 27 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
NDSS
2000
IEEE
13 years 12 months ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
MASCOTS
2008
13 years 9 months ago
Profiling, Prediction, and Capping of Power Consumption in Consolidated Environments
Consolidation of workloads has emerged as a key mechanism to dampen the rapidly growing energy expenditure within enterprise-scale data centers. To gainfully utilize consolidation...
Jeonghwan Choi, Sriram Govindan, Bhuvan Urgaonkar,...
PDCN
2004
13 years 8 months ago
Quality-of-service provisioning system for multimedia transmission in IEEE 802.11 wireless lans
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Joseph Deng, Hsu-Chun Yen
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
13 years 11 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev