Sciweavers

154 search results - page 2 / 31
» A Theory of Runtime Enforcement, with Results
Sort
View
ICCAD
2010
IEEE
145views Hardware» more  ICCAD 2010»
13 years 3 months ago
Fuzzy control for enforcing energy efficiency in high-performance 3D systems
3D stacked circuits reduce communication delay in multicore system-on-chips (SoCs) and enable heterogeneous integration of cores, memories, sensors, and RF devices. However, vertic...
Mohamed M. Sabry, Ayse Kivilcim Coskun, David Atie...
CSFW
2008
IEEE
13 years 6 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
13 years 12 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
ACSAC
2007
IEEE
13 years 11 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
ICPP
2006
IEEE
13 years 11 months ago
Managing Risk of Inaccurate Runtime Estimates for Deadline Constrained Job Admission Control in Clusters
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level ...
Chee Shin Yeo, Rajkumar Buyya