Sciweavers

948 search results - page 128 / 190
» Analysis of SITA policies
Sort
View
COMPSAC
2009
IEEE
15 years 6 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
RTSS
2009
IEEE
15 years 6 months ago
Gang EDF Scheduling of Parallel Task Systems
The preemptive real-time scheduling of sporadic parallel task systems is studied. We present an algorithm, called Gang EDF, which applies the Earliest Deadline First (EDF) policy ...
Shinpei Kato, Yutaka Ishikawa
CDC
2008
IEEE
107views Control Systems» more  CDC 2008»
15 years 6 months ago
Resource pooling for optimal evacuation of a large building
— This paper is concerned with modeling, analysis and optimization/control of occupancy evolution in a large building. The main concern is efficient evacuation of a building in ...
Kun Deng, Wei Chen, Prashant G. Mehta, Sean P. Mey...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 6 months ago
Analyzing Enterprise Architecture in National Governments: The Cases of Denmark and the Netherlands
National enterprise architectures (NEA) promise to fill the gap between policy and implementation. NEAs are embedded within an institutional environment consisting of active playe...
Marijn Janssen, Kristian Hjort-Madsen
ESWS
2007
Springer
15 years 6 months ago
Simple Algorithms for Predicate Suggestions Using Similarity and Co-occurrence
Abstract When creating Semantic Web data, users have to make a critical choice for a vocabulary: only through shared vocabularies can meaning be established. A centralised policy p...
Eyal Oren, Sebastian Gerke, Stefan Decker