Sciweavers

4320 search results - page 857 / 864
» Identity management architecture
Sort
View
TC
2008
13 years 8 months ago
Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems
Abstract--Today's storage systems place an imperative demand on energy efficiency. A storage system often places single-rotationrate disks into standby mode by stopping them f...
Jun Wang, Xiaoyu Yao, Huijun Zhu
JNCA
2007
80views more  JNCA 2007»
13 years 8 months ago
High-speed routers design using data stream distributor unit
As the line rates standards are changing frequently to provide higher bit rates, the routers design has become very challenging due to the need for new wire-speed router’s netwo...
Ali El Kateeb
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 8 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
JTAER
2007
160views more  JTAER 2007»
13 years 8 months ago
Enabling Knowledge Sharing within e-Government Back-Office Through Ontological Engineering
Nowadays, organizational innovation constitutes the government challenges for providing better and more efficient services to citizens, enterprises or other public offices. E–go...
Graciela Brusa, María Laura Caliusco, Omar ...
TVLSI
2008
105views more  TVLSI 2008»
13 years 8 months ago
Robust Concurrent Online Testing of Network-on-Chip-Based SoCs
Lifetime concerns for complex systems-on-a-chip (SoC) designs due to decreasing levels in reliability motivate the development of solutions to ensure reliable operation. A precurso...
Praveen Bhojwani, Rabi N. Mahapatra