Sciweavers

345 search results - page 53 / 69
» Highly configurable transaction management for embedded syst...
Sort
View
JSW
2007
106views more  JSW 2007»
13 years 7 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
APCSAC
2005
IEEE
14 years 1 months ago
The Challenges of Massive On-Chip Concurrency
Moore’s law describes the growth in on-chip transistor density, which doubles every 18 to 24 months and looks set to continue for at least a decade and possibly longer. This grow...
Kostas Bousias, Chris R. Jesshope
WORDS
2002
IEEE
14 years 13 days ago
Reconfiguration of Resources in Middleware
: The monolithic and inflexible nature of current middleware has made it difficult to deal with emerging technologies such as multimedia. Since these applications have timeliness c...
Hector A. Duran-Limon, Gordon S. Blair
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 8 months ago
Mining for misconfigured machines in grid systems
Grid systems are proving increasingly useful for managing the batch computing jobs of organizations. One well known example for that is Intel which uses an internally developed sy...
Noam Palatin, Arie Leizarowitz, Assaf Schuster, Ra...
JSAC
2010
153views more  JSAC 2010»
13 years 2 months ago
Autonomic traffic engineering for network robustness
Abstract--The continuously increasing complexity of communication networks and the increasing diversity and unpredictability of traffic demand has led to a consensus view that the ...
Ali Tizghadam, Alberto Leon-Garcia