Sciweavers

1082 search results - page 31 / 217
» Policy support for call control
Sort
View
RTAS
2002
IEEE
14 years 1 months ago
Performance Evaluation on a Real-Time Database
We have implemented an object-oriented real-time database system called BeeHive. Using BeeHive, the performance of two data-deadline cognizant scheduling policies, called EDDF and...
Suhee Kim, Sang Hyuk Son, John A. Stankovic
SACMAT
2009
ACM
14 years 3 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
AUTOMATICA
2005
92views more  AUTOMATICA 2005»
13 years 8 months ago
Control of manufacturing systems with a two-value, production-dependent failure rate
In this paper we consider a failure prone, single machine, single part-type, limited inventory, manufacturing system subject to a non-homogeneous Markov failure/repair process wit...
Francesco Martinelli
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 3 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
DSN
2008
IEEE
14 years 3 months ago
An integrated approach to resource pool management: Policies, efficiency and quality metrics
: The consolidation of multiple servers and their workloads aims to minimize the number of servers needed thereby enabling the efficient use of server and power resources. At the s...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Gui...