Sciweavers

13618 search results - page 2533 / 2724
» The Newton Operating System
Sort
View
CASES
2009
ACM
15 years 10 months ago
CheckerCore: enhancing an FPGA soft core to capture worst-case execution times
Embedded processors have become increasingly complex, resulting in variable execution behavior and reduced timing predictability. On such processors, safe timing specifications e...
Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Ta...
DIM
2009
ACM
15 years 10 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
MOBIDE
2009
ACM
15 years 10 months ago
Toward context and preference-aware location-based services
The explosive growth of location-detection devices, wireless communications, and mobile databases has resulted in the realization of location-based services as commercial products...
Mohamed F. Mokbel, Justin J. Levandoski
SACMAT
2009
ACM
15 years 10 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
SACMAT
2009
ACM
15 years 10 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
« Prev « First page 2533 / 2724 Last » Next »