Sciweavers

964 search results - page 42 / 193
» On Securely Scheduling a Meeting
Sort
View
ICSM
2002
IEEE
14 years 3 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
CCS
2010
ACM
13 years 6 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
ATAL
2011
Springer
12 years 11 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...
GCA
2008
14 years 12 days ago
A Grid Resource Broker with Dynamic Loading Prediction Scheduling Algorithm in Grid Computing Environment
In a Grid Computing environment, there are various important issues, including information security, resource management, routing, fault tolerance, and so on. Among these issues, ...
Yi-Lun Pan, Chang-Hsing Wu, Weicheng Huang
RTAS
2009
IEEE
14 years 5 months ago
Proactive Speed Scheduling for Real-Time Tasks under Thermal Constraints
Thermal management becomes a prominent issue in system design for both server systems and embedded systems. A system could fail if the peak temperature exceeds its thermal constra...
Jian-Jia Chen, Shengquan Wang, Lothar Thiele