Sciweavers

427 search results - page 48 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
ICTAI
2009
IEEE
15 years 8 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
QOSA
2010
Springer
15 years 3 months ago
Architecture-Driven Reliability and Energy Optimization for Complex Embedded Systems
The use of redundant computational nodes is a widely used design tactic to improve the reliability of complex embedded systems. However, this redundancy allocation has also an effe...
Indika Meedeniya, Barbora Buhnova, Aldeida Aleti, ...
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 10 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
115
Voted
SACMAT
2010
ACM
15 years 9 days ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
SIGSOFT
2007
ACM
16 years 2 months ago
A framework for characterization and analysis of software system scalability
The term scalability appears frequently in computing literature, but it is a term that is poorly defined and poorly understood. The lack of a clear, consistent and systematic trea...
Leticia Duboc, David S. Rosenblum, Tony Wicks