Sciweavers

2024 search results - page 293 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
164
Voted
TES
2001
Springer
15 years 7 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ECRTS
2010
IEEE
15 years 4 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
15 years 8 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
ICSTM
2000
164views Management» more  ICSTM 2000»
15 years 4 months ago
Building Sustainable Interest in Modelling in the Classroom
System Dynamics has had a tough time breaking into High Schools. Like all good ideas the most difficult part is convincing those who would most benefit that this new approach is i...
Gordon Kubanek