Sciweavers

948 search results - page 33 / 190
» Analysis of SITA policies
Sort
View
INFOCOM
2010
IEEE
14 years 7 months ago
Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints
Multimedia streaming applications have stringent QoS requirements. Typically each packet is associated with a packet delivery deadline. This work models and considers realtime stre...
Xiaohang Li, Chih-Chun Wang, Xiaojun Lin
TASE
2008
IEEE
14 years 9 months ago
Optimization of Joint Replacement Policies for Multipart Systems by a Rollout Framework
Maintaining an asset with life-limited parts, e.g., a jet engine or an electric generator, may be costly. Certain costs, e.g., setup cost, can be shared if some parts of the asset ...
Tao Sun, Qianchuan Zhao, Peter B. Luh, Robert N. T...
NTMS
2008
IEEE
15 years 4 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
RIDE
1999
IEEE
15 years 2 months ago
Use of Roles and Policies for Specifying and Managing a Virtual Enterprise
One of the problems faced by an organisation participating in a virtual enterprise is how to specify internal and external aspects of the organisation in terms of the organisation...
Emil Lupu, Zoran Milosevic, Morris Sloman
DOCENG
2005
ACM
14 years 11 months ago
Compiling XPath for streaming access policy
We show how the full XPath language can be compiled into a minimal subset suited for stream-based evaluation. Specifically, we show how XPath normalization into a core language a...
Pierre Genevès, Kristoffer Høgsbro R...