Sciweavers

964 search results - page 59 / 193
» On Securely Scheduling a Meeting
Sort
View
STORAGESS
2006
ACM
14 years 5 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
IFIPTCS
2010
13 years 9 months ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
ASPDAC
2005
ACM
104views Hardware» more  ASPDAC 2005»
14 years 1 months ago
Low-power techniques for network security processors
Abstract— In this paper, we present several techniques for lowpower design, including a descriptor-based low-power scheduling algorithm, design of dynamic voltage generator, and ...
Yi-Ping You, Chun-Yen Tseng, Yu-Hui Huang, Po-Chiu...
IV
2009
IEEE
114views Visualization» more  IV 2009»
14 years 5 months ago
Chronos: A Tool for Interactive Scheduling and Visualisation of Task Hierarchies
Visualisation and structuring of tasks in a schedule, from relatively simple activities such as meeting scheduling to more complex ones such as project planning, has been traditio...
Saturnino Luz, Masood Masoodian, Daniel McKenzie, ...
EUROPAR
2009
Springer
14 years 5 months ago
Scheduling Recurrent Precedence-Constrained Task Graphs on a Symmetric Shared-Memory Multiprocessor
Abstract. We consider approaches that allow task migration for scheduling recurrent directed-acyclic-graph (DAG) tasks on symmetric, shared-memory multiprocessors (SMPs) in order t...
UmaMaheswari C. Devi