Sciweavers

5790 search results - page 13 / 1158
» Distributed programming with distributed authorization
Sort
View
ECOOPW
1998
Springer
13 years 12 months ago
Reflective Authorization Systems
A reflective approach for modeling and implementing authorization systems is presented. The advantages of the combined use of computational reflection and authorization mechanisms...
Massimo Ancona, Walter Cazzola, Eduardo B. Fern&aa...
IEEEPACT
1998
IEEE
13 years 12 months ago
A New Heuristic for Scheduling Parallel Programs on Multiprocessor
In this paper, we present an efficient algorithm, called CASS-II, for task clustering without task duplication. Unlike the DSC algorithm, which is empirically the best known algor...
Jing-Chiou Liou, Michael A. Palis
CCS
2006
ACM
13 years 11 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
EMSOFT
2001
Springer
14 years 4 days ago
Embedded Control: From Asynchrony to Synchrony and Back
Abstract. We propose in this paper a historical perspective of programming issues found in the implementation of control systems, based on the author’s observations for more than...
Paul Caspi