Sciweavers

926 search results - page 148 / 186
» Understanding the requirements for developing open source so...
Sort
View
ICSE
2005
IEEE-ACM
14 years 8 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
SASO
2008
IEEE
14 years 2 months ago
Social Networking for Pervasive Adaptation
As technology progresses, we are seeing increasing numbers of small devices that have the capability to store, process and forward information in our everyday physical environment...
Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin...
IFM
2004
Springer
14 years 1 months ago
Verifying Controlled Components
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express intera...
Steve Schneider, Helen Treharne
JSAC
2011
137views more  JSAC 2011»
13 years 2 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
CODES
2006
IEEE
14 years 1 months ago
Automatic run-time extraction of communication graphs from multithreaded applications
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
Ai-Hsin Liu, Robert P. Dick