Sciweavers

2753 search results - page 484 / 551
» An architecture model for supporting application integration...
Sort
View
CCS
2008
ACM
14 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
DATE
2000
IEEE
140views Hardware» more  DATE 2000»
15 years 2 months ago
Resolution of Dynamic Memory Allocation and Pointers for the Behavioral Synthesis from C
-- One of the greatest challenges in C/C++-based design methodology is to efficiently map C/C++ models into hardware. Many of the networking and multimedia applications implemente...
Luc Séméria, Koichi Sato, Giovanni D...
ESCIENCE
2006
IEEE
15 years 3 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
ACSAC
2000
IEEE
15 years 2 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
CCGRID
2009
IEEE
15 years 4 months ago
Scheduling Strategies for Cycle Scavenging in Multicluster Grid Systems
The use of today’s multicluster grids exhibits periods of submission bursts with periods of normal use and even of idleness. To avoid resource contention, many users employ obse...
Omer Ozan Sonmez, Bart Grundeken, Hashim H. Mohame...