Sciweavers

10072 search results - page 1890 / 2015
» Composition of Model Programs
Sort
View
TDSC
2008
152views more  TDSC 2008»
15 years 4 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
JASIS
2007
119views more  JASIS 2007»
15 years 4 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff
TMC
2008
136views more  TMC 2008»
15 years 4 months ago
Efficient Resource Allocation for Wireless Multicast
In this paper, we propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. We reduce the bandwidth cost of an Internet Protocol (IP) multicast tree by...
De-Nian Yang, Ming-Syan Chen
TOCS
2008
72views more  TOCS 2008»
15 years 4 months ago
Rethink the sync
We introduce external synchrony, a new model for local file I/O that provides the reliability and simplicity of synchronous I/O, yet also closely approximates the performance of a...
Edmund B. Nightingale, Kaushik Veeraraghavan, Pete...
CCE
2005
15 years 4 months ago
Logic-based outer approximation for globally optimal synthesis of process networks
Process network problems can be formulated as Generalized Disjunctive Programs where a logicbased representation is used to deal with the discrete and continuous decisions. A new ...
María Lorena Bergamini, Pío A. Aguir...
« Prev « First page 1890 / 2015 Last » Next »