Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Real-time database systems incorporate the notion of a deadline into the database system model. USUally, deadlines are associated with transactions, and the system attempts to exe...
Henry F. Korth, Nandit Soparkar, Abraham Silbersch...
A constraint expresses a relationship among one or more variables. Constraints are very useful in the development of collaborative applications, such as collaborative CAD and CASE ...
Kai Lin, David Chen, Chengzheng Sun, R. Geoff Drom...
Thermal management becomes a prominent issue in system design for both server systems and embedded systems. A system could fail if the peak temperature exceeds its thermal constra...
Abstract. Self-adaptive systems must recon gure themselves, at runtime, to compensate for changing environments, objectives, and system capabilities. This paper discusses how the S...