Sciweavers

1557 search results - page 178 / 312
» Evolution of Business Processes and a Process Simulation Too...
Sort
View
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
105
Voted
DATE
2007
IEEE
99views Hardware» more  DATE 2007»
15 years 10 months ago
Instruction trace compression for rapid instruction cache simulation
Modern Application Specific Instruction Set Processors (ASIPs) have customizable caches, where the size, associativity and line size can all be customized to suit a particular ap...
Andhi Janapsatya, Aleksandar Ignjatovic, Sri Param...
PDP
2007
IEEE
15 years 10 months ago
RealPeer--A Framework for Simulation-Based Development of Peer-to-Peer Systems
In the process of developing P2P systems simulation has proved to be an essential tool for the evaluation of existing and conceived P2P systems. So far, in practice there has been...
Dieter Hildebrandt, Ludger Bischofs, Wilhelm Hasse...
WSC
2007
15 years 6 months ago
Special purpose simulation template for workflow analysis in construction
Workflow analysis is an important component in the simulation of construction operations. It involves creating a specific number of work requests for a crew every time period, com...
Sivakumar Palaniappan, Anil Sawhney, Howard H. Bas...
QEST
2010
IEEE
15 years 1 months ago
Rare Event Simulation for Highly Dependable Systems with Fast Repairs
Stochastic model checking has been used recently to assess, among others, dependability measures for a variety of systems. However, the employed numerical methods, as, e.g., suppor...
Daniël Reijsbergen, Pieter-Tjerk de Boer, Wer...