Sciweavers

579 search results - page 102 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
IPPS
2002
IEEE
14 years 17 days ago
A Framework for Network Management Using Mobile Agents
Conventional network management is based on SNMP and often run in a centralized manner. Although the centralized management approach gives network administrators a flexibility of ...
Manoj Kumar Kona, Cheng-Zhong Xu
ISPAN
2000
IEEE
14 years 1 days ago
Versatile Processor Design for Efficiency and High Performance
We present new architectural concepts for uniprocessor designs that conform to the data-driven computation paradigm. Usage of our D2 -CPU (Data-Driven processor) follows the natura...
Sotirios G. Ziavras
ISESE
2006
IEEE
14 years 1 months ago
Predicting component failures at design time
How do design decisions impact the quality of the resulting software? In an empirical study of 52 ECLIPSE plug-ins, we found that the software design as well as past failure histo...
Adrian Schröter, Thomas Zimmermann, Andreas Z...
LCTRTS
2001
Springer
14 years 2 days ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
CCGRID
2009
IEEE
14 years 2 months ago
BLAST Application with Data-Aware Desktop Grid Middleware
—There exists numerous Grid middleware to develop and execute programs on the computational Grid, but they still require intensive work from their users. BitDew is made to facili...
Haiwu He, Gilles Fedak, Bing Tang, Franck Cappello