Sciweavers

581 search results - page 69 / 117
» policy 2009
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
CSE
2009
IEEE
14 years 3 months ago
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
Abstract—Vocabulary alignment is a main challenge in distributed access control as peers should understand each other’s policies unambiguously. Ontologies enable mutual underst...
Daniel Trivellato, Fred Spiessens, Nicola Zannone,...
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
14 years 3 months ago
Performance optimal speed control of multi-core processors under thermal constraints
Abstract—Advances in chip-multiprocessor processing capabilities has led to an increased power consumption and temperature hotspots. Maintaining the on-chip temperature is import...
Vinay Hanumaiah, Sarma B. K. Vrudhula, Karam S. Ch...
EUROMICRO
2009
IEEE
14 years 3 months ago
An Architecture-Based Framework for Managing Adaptive Real-Time Applications
—Real-time systems are increasingly used in dynamic changing environments with variable user needs, hosting real-time applications ranging in number and nature. This paper propos...
Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blon...
GLOBECOM
2009
IEEE
14 years 3 months ago
Fusion and Diversity Trade-Offs in Cooperative Estimation over Fading Channels
—In this paper we consider a network of distributed sensors that are trying to measure a parameter of interest cooperatively, by exchanging their acquired information repeatedly ...
Mehrzad Malmirchegini, Yasamin Mostofi