Sciweavers

6025 search results - page 1022 / 1205
» Flexibility in Service Processes
Sort
View
130
Voted
EOR
2007
102views more  EOR 2007»
15 years 4 months ago
Sub-stochastic matrix analysis for bounds computation - Theoretical results
Performance evaluation of complex systems is a critical issue and bounds computation provides confidence about service quality, reliability, etc. of such systems. The stochastic ...
Serge Haddad, Patrice Moreaux
134
Voted
SAC
2006
ACM
15 years 4 months ago
Design and implementation of a context-aware decision algorithm for heterogeneous networks
Wireless networks and mobile terminals are evolving towards being heterogeneous. In this environment, intelligent handover decision, beyond traditional ones that are based on only...
Tansir Ahmed, Kyandoghere Kyamakya, Markus Ludwig
SIGOPS
2008
183views more  SIGOPS 2008»
15 years 4 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
TKDE
2008
177views more  TKDE 2008»
15 years 4 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TPDS
2008
72views more  TPDS 2008»
15 years 4 months ago
Replica Placement and Access Policies in Tree Networks
In this paper, we discuss and compare several policies to place replicas in tree networks, subject to server capacity and Quality of Service (QoS) constraints. The client requests ...
Anne Benoit, Veronika Rehn-Sonigo, Yves Robert
« Prev « First page 1022 / 1205 Last » Next »