Sciweavers

5269 search results - page 1005 / 1054
» Operating system resource management
Sort
View
CCS
2006
ACM
14 years 13 days ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
WSC
1994
13 years 10 months ago
AutoStat
Whether designing a new system or modifying an existing one, engineers want to take the guesswork out of finding the best possible solution. While there are many analysis methods ...
Matthew W. Rohrer
INFOCOM
2010
IEEE
13 years 7 months ago
Stable Maximum Throughput Broadcast in Wireless Fading Channels
—This research considers network coded broadcast system with multi-rate transmission and dual queue stability constraints. Existing network coded broadcast systems consider singl...
Wei Pu, Hao Cui, Chong Luo, Feng Wu, Chang Wen Che...
ASPLOS
2012
ACM
12 years 4 months ago
DreamWeaver: architectural support for deep sleep
Numerous data center services exhibit low average utilization leading to poor energy efficiency. Although CPU voltage and frequency scaling historically has been an effective mea...
David Meisner, Thomas F. Wenisch
SIGSOFT
2007
ACM
14 years 9 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
« Prev « First page 1005 / 1054 Last » Next »