Sciweavers

1627 search results - page 100 / 326
» On context in authorization policy
Sort
View
CF
2005
ACM
14 years 22 days ago
Controlling leakage power with the replacement policy in slumberous caches
As technology scales down at an exponential rate, leakage power is fast becoming the dominant component of the total power budget. A large share of the total leakage power is diss...
Nasir Mohyuddin, Rashed Bhatti, Michel Dubois
DSOM
2003
Springer
14 years 4 months ago
Eos: An Approach of Using Behavior Implications for Policy-Based Self-Management
Systems are becoming exceedingly complex to manage. As such, there is an increasing trend towards developing systems that are self-managing. Policy-based infrastructures have been ...
Sandeep Uttamchandani, Carolyn L. Talcott, David P...
AI
2008
Springer
13 years 11 months ago
Maintenance goals of agents in a dynamic environment: Formulation and policy construction
The notion of maintenance often appears in the AI literature in the context of agent behavior and planning. In this paper, we argue that earlier characterizations of the notion of...
Chitta Baral, Thomas Eiter, Marcus Bjäreland,...
CN
2004
150views more  CN 2004»
13 years 10 months ago
Optimizing interconnection policies
There are two basic types of interconnection agreements between providers in the Internet: peering and transit. A decision every Internet network service provider (INSP) has to ma...
Oliver Heckmann, Jens Schmitt, Ralf Steinmetz
IJIDE
2010
152views more  IJIDE 2010»
13 years 5 months ago
Digital Divide in India: Measurement, Determinants and Policy for Addressing the Challenges in Bridging the Digital Divide
: In the recent years, the notion of `digital divide' has been widely researched, and has attracted much debate and speculation for its economic, social and political conseque...
Sumanjeet Singh