Sciweavers

3764 search results - page 45 / 753
» Design and Implementation of Performance Policies for SMS Sy...
Sort
View
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
USENIX
2001
13 years 10 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
ICMI
2003
Springer
99views Biometrics» more  ICMI 2003»
14 years 1 months ago
Selective perception policies for guiding sensing and computation in multimodal systems: a comparative analysis
Intensive computations required for sensing and processing perceptual information can impose significant burdens on personal computer systems. We explore several policies for sel...
Nuria Oliver, Eric Horvitz
SOSP
1997
ACM
13 years 10 months ago
The Design, Implementation and Evaluation of SMART: A Scheduler for Multimedia Applications
Real-time applications such as multimedia audio and video are increasingly populating the workstation desktop. To support the execution of these applications in conjunction with t...
Jason Nieh, Monica S. Lam
SIGCOMM
2004
ACM
14 years 2 months ago
The design and implementation of a next generation name service for the internet
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
Venugopalan Ramasubramanian, Emin Gün Sirer