Sciweavers

1627 search results - page 116 / 326
» On context in authorization policy
Sort
View
IFIP8
2004
14 years 2 days ago
Towards Highly Adaptive Services for Mobile Computing
: The heterogeneity of device capabilities, network conditions and user contexts that is associated with mobile computing has emphasized the need for more advanced forms of adaptat...
Alessandra Agostini, Claudio Bettini, Nicolò...
IPPS
2005
IEEE
14 years 4 months ago
Scheduling Algorithms for Effective Thread Pairing on Hybrid Multiprocessors
With the latest high-end computing nodes combining shared-memory multiprocessing with hardware multithreading, new scheduling policies are necessary for workloads consisting of mu...
Robert L. McGregor, Christos D. Antonopoulos, Dimi...
PLDI
1997
ACM
14 years 2 months ago
Dynamic Feedback: An Effective Technique for Adaptive Computing
This paper presents dynamic feedback, a technique that enables computations to adapt dynamically to different execution environments. A compiler that uses dynamic feedback produce...
Pedro C. Diniz, Martin C. Rinard
CSCW
2012
ACM
12 years 6 months ago
Boundary regulation in social media
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we expl...
Stutzman Frederic, Hartzog Woodrow
ACSAC
2006
IEEE
14 years 4 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...