Sciweavers

3712 search results - page 667 / 743
» Role-Based Access Control
Sort
View
ICPADS
2006
IEEE
14 years 3 months ago
Policy-Directed Data Movement in Grids
One of the guiding principles of the Grid is local (site) autonomy. Resource owners maintain control over their resources even when those resources are part of a larger Grid. In o...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
ISPASS
2006
IEEE
14 years 3 months ago
Improved stride prefetching using extrinsic stream characteristics
Stride-based prefetching mechanisms exploit regular streams of memory accesses to hide memory latency. While these mechanisms are effective, they can be improved by studying the p...
Hassan Al-Sukhni, James Holt, Daniel A. Connors
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ICDCS
2005
IEEE
14 years 2 months ago
Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach
Power heterogeneous ad hoc networks are characterized by link layer asymmetry: the ability of lower power nodes to receive transmissions from higher power nodes but not vice versa...
Vasudev Shah, Srikanth V. Krishnamurthy
RTSS
2005
IEEE
14 years 2 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar