Sciweavers

852 search results - page 129 / 171
» Model-Checking Access Control Policies
Sort
View
DSOM
2006
Springer
13 years 10 months ago
A WSDM-Based Architecture for Global Usage Characterization of Grid Computing Infrastructures
Current solutions to characterize grid computing usage are limited in three important aspects. First, they do not provide a global, uniform view of the use of infrastructures compr...
Glauco Antonio Ludwig, Luciano Paschoal Gaspary, G...
ENTCS
2007
199views more  ENTCS 2007»
13 years 8 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
TII
2008
169views more  TII 2008»
13 years 8 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet
ICASSP
2011
IEEE
13 years 17 days ago
Adaptive scalable layer filtering process for video scheduling over wireless networks based on MAC buffer management
In this paper, the problem of scalable video delivery over a timevarying wireless channel is considered. Packet scheduling and buffer management in both Application and Medium Acc...
Nesrine Changuel, Nicholas Mastronarde, Mihaela va...
WAIM
2005
Springer
14 years 2 months ago
Integrative Security Management for Web-Based Enterprise Applications
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...