Sciweavers

948 search results - page 111 / 190
» Analysis of SITA policies
Sort
View
CCS
2006
ACM
15 years 3 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
AUTOMATICA
2006
104views more  AUTOMATICA 2006»
14 years 12 months ago
Identification of multi-input systems: variance analysis and input design issues
This paper examines the identification of multi-input systems. Motivated by an experiment design problem (should one excite the various inputs simultaneously or separately), we ex...
Michel Gevers, Ljubisa Miskovic, Dominique Bonvin,...
EOR
2007
85views more  EOR 2007»
14 years 12 months ago
Modeling and analysis of a supply-assembly-store chain
We consider a supply–assembly–store chain with produce-to-stock strategy, which comprises a set of component suppliers, a mixed-model assembly line with a constantly moving co...
Xiaobo Zhao, Deju Xu, Hanqin Zhang, Qi-Ming He
ICC
2008
IEEE
128views Communications» more  ICC 2008»
15 years 6 months ago
Experimental Analysis of Super-Seeding in BitTorrent
—With the popularity of BitTorrent, improving its performance has been an active research area. Super-seeding, a special upload policy for initial seeds, improves the efficiency ...
Zhijia Chen, Yang Chen, Chuang Lin, Vaibhav Nivarg...
RSP
2005
IEEE
131views Control Systems» more  RSP 2005»
15 years 5 months ago
Models for Embedded Application Mapping onto NoCs: Timing Analysis
Networks-on-chip (NoCs) are an emergent communication infrastructure, which can be designed to deal with growing system complexity and technology evolution. The efficient use of N...
César A. M. Marcon, Márcio Eduardo K...