Sciweavers

399 search results - page 79 / 80
» Managing Metadata for Distributed Information Servers
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
28
Voted
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
EMSOFT
2004
Springer
14 years 28 days ago
Using resource reservation techniques for power-aware scheduling
Minimizing energy consumption is an important issue in the design of real-time embedded systems. As many embedded systems are powered by rechargeable batteries, the goal is to ext...
Claudio Scordino, Giuseppe Lipari
KDD
2010
ACM
253views Data Mining» more  KDD 2010»
13 years 11 months ago
Mining periodic behaviors for moving objects
Periodicity is a frequently happening phenomenon for moving objects. Finding periodic behaviors is essential to understanding object movements. However, periodic behaviors could b...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays, P...
BMCBI
2008
160views more  BMCBI 2008»
13 years 7 months ago
VariVis: a visualisation toolkit for variation databases
Background: With the completion of the Human Genome Project and recent advancements in mutation detection technologies, the volume of data available on genetic variations has rise...
Timothy D. Smith, Richard G. H. Cotton