Sciweavers

123 search results - page 5 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
IEEEARES
2006
IEEE
14 years 22 days ago
Making Web Services Dependable
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
DAC
2006
ACM
14 years 7 months ago
High-level power management of embedded systems with application-specific energy cost functions
Most existing dynamic voltage scaling (DVS) schemes for multiple tasks assume an energy cost function (energy consumption versus execution time) that is independent of the task ch...
Youngjin Cho, Naehyuck Chang, Chaitali Chakrabarti...
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 days ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
CCS
2009
ACM
14 years 7 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
DAC
2002
ACM
14 years 7 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...