Sciweavers

724 search results - page 103 / 145
» Implementing Execution Controls in Unix
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Time-varying Opportunistic Protocol for maximizing sensor networks lifetime
We consider transmission scheduling by medium access control (MAC) protocols for energy limited wireless sensor networks (WSN) in order to maximize the network lifetime. Time-vary...
Kobi Cohen, Amir Leshem
ICST
2009
IEEE
14 years 2 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
IWPC
2007
IEEE
14 years 2 months ago
Recovering Workflows from Multi Tiered E-commerce Systems
A workflow is a computerized specification of a business process. A workflow describes how tasks are executed and ordered following business policies. E-commerce systems implement...
Maokeng Hung, Ying Zou
SASO
2007
IEEE
14 years 2 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
MICRO
2006
IEEE
102views Hardware» more  MICRO 2006»
14 years 2 months ago
Managing Distributed, Shared L2 Caches through OS-Level Page Allocation
This paper presents and studies a distributed L2 cache management approach through OS-level page allocation for future many-core processors. L2 cache management is a crucial multi...
Sangyeun Cho, Lei Jin