Sciweavers

20 search results - page 2 / 4
» On Conversation Policies and the Need for Exceptions
Sort
View
ISLPED
2005
ACM
122views Hardware» more  ISLPED 2005»
13 years 11 months ago
A simple mechanism to adapt leakage-control policies to temperature
Leakage power reduction in cache memories continues to be a critical area of research because of the promise of a significant pay-off. Various techniques have been developed so fa...
Stefanos Kaxiras, Polychronis Xekalakis, Georgios ...
DAGSTUHL
2003
13 years 7 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec
ACSAC
2001
IEEE
13 years 9 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 3 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
IFIP
2010
Springer
13 years 14 days ago
Autonomic Approach to Planning and Scheduling in Networked Small Factories
The paper considers the complex behavior of a small company in a business ecosystem, time by time leader or supplier or both in one or more supply chains, and points out the data e...
Flavio Bonfatti, Luca Martinelli, Paola Daniela Mo...