Sciweavers

2106 search results - page 125 / 422
» Specifying C concepts
Sort
View
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
IPPS
2006
IEEE
14 years 4 months ago
A hierarchical scheduling model for component-based real-time systems
In this paper, we propose a methodology for developing component-based real-time systems based on the concept of hierarchical scheduling. Recently, much work has been devoted to t...
José L. Lorente, Giuseppe Lipari, Enrico Bi...
ECMDAFA
2005
Springer
125views Hardware» more  ECMDAFA 2005»
14 years 3 months ago
Making Metamodels Aware of Concrete Syntax
Language-centric methodologies, triggered by the success of Domain Specific Languages, rely on precise specifications of modeling s. While the definition of the abstract syntax ...
Frédéric Fondement, Thomas Baar
IAW
2003
IEEE
14 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
TAGT
1998
Springer
184views Graph Theory» more  TAGT 1998»
14 years 2 months ago
A Framework for Adding Packages to Graph Transformation Approaches
Graphs are a commonly used formalism for modeling many different kinds of static and dynamic data. In many applications, data modeling can be improved by using hierarchically struc...
Giorgio Busatto, Gregor Engels, Katharina Mehner, ...