Sciweavers

143 search results - page 10 / 29
» Architecture optimisation with Currawong
Sort
View
DEBS
2003
ACM
15 years 2 months ago
Role-based access control for publish/subscribe middleware architectures
Research into publish/subscribe messaging has so far done little to propose architectures for the support of access control, yet this will be an increasingly critical requirement ...
András Belokosztolszki, David M. Eyers, Pet...
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
15 years 2 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...
61
Voted
CISIS
2010
IEEE
15 years 2 months ago
Study of Variations of Native Program Execution Times on Multi-Core Architectures
Abstract—Program performance optimisations, feedbackdirected iterative compilation and auto-tuning systems [1] all assume a fixed estimation of execution time given a fixed inp...
Abdelhafid Mazouz, Sid Ahmed Ali Touati, Denis Bar...
AAAI
2008
14 years 12 months ago
Personalisation of Telecommunications Services as Combinatorial Optimisation
Modern feature-rich telecommunications services offer significant opportunities to human users. To make these services more usable, facilitating personalisation is very important....
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
IEEECIT
2010
IEEE
14 years 7 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark