Sciweavers

556 search results - page 92 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
ICLP
2003
Springer
15 years 5 months ago
Flow Java: Declarative Concurrency for Java
Abstract. Logic variables pioneered by (concurrent) logic and concurrent constraint programming are powerful mechanisms for automatically synchronizing concurrent computations. The...
Frej Drejhammar, Christian Schulte, Per Brand, Sei...
TRUST
2009
Springer
15 years 6 months ago
ACPI: Design Principles and Concerns
Abstract. ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management...
Loïc Duflot, Olivier Levillain, Benjamin Mori...
GI
2003
Springer
15 years 5 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
AINA
2010
IEEE
15 years 4 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
ECCV
2000
Springer
16 years 1 months ago
Coupled Geodesic Active Regions for Image Segmentation: A Level Set Approach
Abstract. This paper presents anovel variational method forimage segmentation that uni es boundary and region-based information sources under the Geodesic Active Region framework. ...
Nikos Paragios, Rachid Deriche