Sciweavers

318 search results - page 34 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ICAC
2008
IEEE
14 years 2 months ago
Generating Adaptation Policies for Multi-tier Applications in Consolidated Server Environments
Creating good adaptation policies is critical to building complex autonomic systems since it is such policies that define the system configuration used in any given situation. W...
Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltune...
SASO
2008
IEEE
14 years 2 months ago
Self-Organizing Dynamic Ad Hoc Grids
Resource management for ad hoc grids is challenging due to the participation of heterogeneous, dynamic, autonomous and ephemeral nodes. Different underlying network infrastructure...
Tariq Abdullah, Vassiliy Sokolov, Behnaz Pourebrah...
WORDS
2005
IEEE
14 years 1 months ago
Virtual Networks in an Integrated Time-Triggered Architecture
Depending on the physical structuring of large distributed safety-critical real-time systems, one can distinguish federated and integrated system architectures. This paper investi...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
HICSS
2002
IEEE
112views Biometrics» more  HICSS 2002»
14 years 17 days ago
Investigating Telemedicine Developments in Taiwan: Implications for Telemedicine Program Management
Telemedicine development in Taiwan has proliferated considerably since the 1990s, as manifested by its inclusion as a core application area in the National Infrastructure Initiati...
Paul Jen-Hwa Hu, Chih-Ping Wei, Tsang-Hsiang Cheng