Sciweavers

173 search results - page 26 / 35
» Evaluating Access Control Policies Through Model Checking
Sort
View
DAC
2007
ACM
14 years 8 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...

Publication
342views
14 years 9 months ago
Understanding the relationships between regional accessibility travel behaviour and home value
Accessibility is a comprehensive measure of the interaction between land use and transportation systems. It has been put forward as a performance-measure for evaluating the land u...
Cerda, A. and El-Geneidy, A.
ECSCW
2007
13 years 9 months ago
Semi-Synchronous Conflict Detection and Resolution in Asynchronous Software Development
Previous work has found that (a) when software is developed collaboratively, concurrent accesses to related pieces of code are made, and (b) when these accesses are coordinated asy...
Prasun Dewan, Rajesh Hegde
TAMODIA
2008
13 years 9 months ago
A Fluid Flow Approach to Usability Analysis of Multi-user Systems
Abstract. The analysis of usability aspects of multi-user systems, such as cooperative work systems and pervasive systems, pose particular problems because group behavior of their ...
Mieke Massink, Diego Latella, Maurice H. ter Beek,...
ENTCS
2007
140views more  ENTCS 2007»
13 years 7 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...