Sciweavers

901 search results - page 164 / 181
» Engineering Emergence
Sort
View
ACSAC
2009
IEEE
14 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
SENSYS
2009
ACM
14 years 4 months ago
Macrodebugging: global views of distributed program execution
Creating and debugging programs for wireless embedded networks (WENs) is notoriously difficult. Macroprogramming is an emerging technology that aims to address this by providing ...
Tamim I. Sookoor, Timothy W. Hnat, Pieter Hooimeij...
CSE
2009
IEEE
14 years 4 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
CSE
2009
IEEE
14 years 4 months ago
TagRec: Leveraging Tagging Wisdom for Recommendation
—Due to the exponential growth of information on the Web, Recommender Systems have been developed to generate suggestions to help users overcome information overload and sift thr...
Tom Chao Zhou, Hao Ma, Irwin King, Michael R. Lyu
IEEEPACT
2009
IEEE
14 years 4 months ago
StealthTest: Low Overhead Online Software Testing Using Transactional Memory
—Software testing is hard. The emergence of multicore architectures and the proliferation of bugprone multithreaded software makes testing even harder. To this end, researchers h...
Jayaram Bobba, Weiwei Xiong, Luke Yen, Mark D. Hil...