Sciweavers

3712 search results - page 605 / 743
» Role-Based Access Control
Sort
View
HIPEAC
2007
Springer
14 years 2 months ago
Sunflower :  Full-System, Embedded Microarchitecture Evaluation
Abstract. This paper describes Sunflower, a full-system microarchitectural evaluation environment for embedded computing systems. The environment enables detailed microarchitectura...
Phillip Stanley-Marbell, Diana Marculescu
ICAIL
2007
ACM
14 years 2 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ICLP
2007
Springer
14 years 2 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
AOSD
2007
ACM
14 years 2 months ago
Performance improvement for persistent systems by AOP
Efficient data retrieval from databases is a significant issue of the design of persistent systems. We propose an aspect oriented persistent system named AspectualStore. Aspectual...
Yasuhiro Aoki, Shigeru Chiba
AINA
2004
IEEE
14 years 1 months ago
An Overlay Network Architecture for Data Placement Strategies in a P2P Streaming Network
Abstract--Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them ...
Kan Hung Wan, Chris Loeser