Sciweavers

1471 search results - page 157 / 295
» Composing concurrency control
Sort
View
ACSAC
2000
IEEE
15 years 2 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
JUCS
2007
114views more  JUCS 2007»
14 years 10 months ago
Design and Implementation of the AMCC Self-Timed Microprocessor in FPGAs
: The development of processors with full custom technology has some disadvantages, such as the time used to design the processors and the cost of the implementation. In this artic...
Susana Ortega-Cisneros, Juan Jóse Raygoza-P...
COMCOM
2004
79views more  COMCOM 2004»
14 years 10 months ago
Interdomain traffic engineering with redistribution communities
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of pack...
Bruno Quoitin, Sébastien Tandel, Steve Uhli...
CAD
2002
Springer
14 years 10 months ago
Free-form design using axial curve-pairs
Deformation of 3D shapes usually requires the use of a deformation tool. The freeform deformation technique requires the use of a lattice of control point for deforming an object....
K. C. Hui
DSN
2009
IEEE
15 years 4 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman