Sciweavers

400 search results - page 47 / 80
» Implementing responsibility for states and events
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
INFOCOM
2007
IEEE
14 years 1 months ago
Empirical Evaluation of Techniques for Measuring Available Bandwidth
Abstract— The ability to measure end-to-end Available Bandwidth (AB) on a network path is useful in several domains, including overlay-routing infrastructure, network monitoring,...
Alok Shriram, Jasleen Kaur
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
14 years 10 days ago
Kinetic perturbations as robustness analysis tool for biochemical reaction networks
— Models of biochemical reaction networks can be decomposed into a stoichiometric part and a kinetic part. The stoichiometric part describes the structural mass flows while the ...
Steffen Waldherr, Frank Allgöwer, Elling W. J...
ASPDAC
2000
ACM
97views Hardware» more  ASPDAC 2000»
13 years 12 months ago
Symbolic debugging of globally optimized behavioral specifications
Symbolic debuggers are system development tools that can accelerate the validation speed of behavioral specifications by allowing a user to interact with an executing code at the ...
Inki Hong, Darko Kirovski, Miodrag Potkonjak, Mari...
CCGRID
2011
IEEE
12 years 11 months ago
Towards Real-Time, Volunteer Distributed Computing
Many large-scale distributed computing applications demand real-time responses by soft deadlines. To enable such real-time task distribution and execution on the volunteer resourc...
Sangho Yi, Emmanuel Jeannot, Derrick Kondo, David ...