Sciweavers

565 search results - page 96 / 113
» A logic for authorization provenance
Sort
View
78
Voted
TCS
2002
15 years 1 months ago
Set-sharing is redundant for pair-sharing
Although the usual goal of sharing analysis is to detect which pairs of variables share, the standard choice for sharing analysis is a domain that characterizes set-sharing. In th...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
NETWORKS
2007
15 years 1 months ago
Vertex disjoint routings of cycles over tori
We study the problem of designing a survivable WDM network based on covering the communication requests with subnetworks that are protected independently from each other. We consi...
Jean-Claude Bermond, Min-Li Yu
SAC
2008
ACM
15 years 1 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...
147
Voted
HUC
2010
Springer
15 years 11 days ago
EnergyLife: pervasive energy awareness for households
We present Energy Life a system utilizing wireless sensors, mobile and ambient interfaces that turn energy consumers into active players. Energy Life participants play through dif...
Christoffer Björkskog, Giulio Jacucci, Lucian...
CNSM
2010
14 years 12 months ago
Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains
Abstract--Change Management, a core process of the Information Technology Infrastructure Library (ITIL), is concerned with the management of changes to IT infrastructure and servic...
Sebastian Hagen, Alfons Kemper