Sciweavers

1497 search results - page 278 / 300
» Extended static checking
Sort
View
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
OTM
2009
Springer
14 years 3 months ago
Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems
The need for semantics preserving integration of complex data has been widely recognized in the healthcare domain. While standards such as Health Level Seven (HL7) have been develo...
Antoine Zimmermann, Ratnesh Sahay, Ronan Fox, Axel...
INFOCOM
2008
IEEE
14 years 3 months ago
Feasible Rate Allocation in Wireless Networks
—Rate allocation is a fundamental problem in the operation of a wireless network because of the necessity to schedule the operation of mutually interfering links between the node...
Ramakrishna Gummadi, Kyomin Jung, Devavrat Shah, R...
CCS
2007
ACM
14 years 3 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
IPPS
2006
IEEE
14 years 2 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner