Sciweavers

205 search results - page 13 / 41
» Using Work Agreements as Operation-time System Requirements ...
Sort
View
UML
2005
Springer
14 years 1 months ago
Dynamic Secure Aspect Modeling with UML: From Models to Code
Abstract. Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticip...
Jan Jürjens, Siv Hilde Houmb
CCGRID
2005
IEEE
14 years 1 months ago
Continuous resources allocation in Internet data centers
Internet data centers (IDCs) perform multi-customer hosting on a virtualized collection of resources while Grid computing generalizes distributed computing by focusing on large sc...
Youssef Hamadi
GLOBECOM
2009
IEEE
13 years 11 months ago
Optimal Resource Scheduling in Wireless Multiservice Systems with Random Channel Connectivity
We investigate an optimal scheduling problem in a discrete-time system of L parallel queues that are served by K identical servers. This model has been widely used in studies of em...
Hussein Al-Zubaidy, Ioannis Lambadaris, Ioannis Vi...
WS
2004
ACM
14 years 29 days ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
CASES
2007
ACM
13 years 11 months ago
Performance optimal processor throttling under thermal constraints
We derive analytically, the performance optimal throttling curve for a processor under thermal constraints for a given task sequence. We found that keeping the chip temperature co...
Ravishankar Rao, Sarma B. K. Vrudhula