Sciweavers

333 search results - page 30 / 67
» Modeling and language support for the management of pattern-...
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 1 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
IDEAS
2010
IEEE
141views Database» more  IDEAS 2010»
13 years 5 months ago
Modeling synchronized time series
Abstract. We consider the class of applications that manage time series (TS) and propose a data model and a query language that let these applications manipulate TS data sets at a ...
Zoé Faget, Philippe Rigaux, David Gross-Amb...
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
13 years 5 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
CCGRID
2006
IEEE
14 years 1 months ago
How the JSDL can Exploit the Parallelism?
The description of the jobs is a very important issue for the scheduling and management of Grid jobs. Since there are a lot of different languages for describing Grid jobs, the GG...
Ivan Rodero, Francesc Guim, Julita Corbalán...
CIMCA
2006
IEEE
14 years 1 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet