Sciweavers

1040 search results - page 8 / 208
» Resource Usage Verification
Sort
View
DBSEC
2007
121views Database» more  DBSEC 2007»
13 years 8 months ago
XACML Policies for Exclusive Resource Usage
The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesse...
Vijayant Dhankhar, Saket Kaushik, Duminda Wijeseke...
CIMCA
2008
IEEE
14 years 1 months ago
Analyzing Resource-Usage Impact on Component-Based Systems Performance and Reliability
An early prediction of resource utilization and its impact on system performance and reliability can reduce the overall system cost, by allowing early correction of detected probl...
Aida Causevic, Paul Pettersson, Cristina Cerschi S...
COORDINATION
2010
Springer
13 years 11 months ago
Coordinating Resource Usage through Adaptive Service Provisioning in Wireless Sensor Networks
Abstract. Wireless sensor networks (WSNs) exhibit high levels of network dynamics and consist of devices with limited energy. This results in the need to coordinate applications no...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
AADEBUG
2005
Springer
14 years 27 days ago
Specifying and checking component usage
One of today’s challenges is producing reliable software in the face of an increasing number of interacting components. Our system CHET lets developers define specifications des...
Steven P. Reiss