Sciweavers

244 search results - page 37 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
KES
2006
Springer
14 years 9 months ago
Predicting Cluster Formation in Decentralized Sensor Grids
This paper investigates cluster formation in decentralized sensor grids and focusses on predicting when the cluster formation converges to a stable configuration. The traffic volum...
Astrid Zeman, Mikhail Prokopenko
94
Voted
ICRA
2005
IEEE
125views Robotics» more  ICRA 2005»
15 years 3 months ago
Bullwhip effect in Integrated Manufacturing and Service Networks
- An Integrated Manufacturing and Service Network (IMSN) is a grouping of companies, working together to offer a bundle of products and product-related services, that deliver value...
Nukala Viswanadham, Vijay Desai, Roshan S. Gaonkar
DAC
2007
ACM
15 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
GCA
2008
14 years 11 months ago
A Grid Resource Broker with Dynamic Loading Prediction Scheduling Algorithm in Grid Computing Environment
In a Grid Computing environment, there are various important issues, including information security, resource management, routing, fault tolerance, and so on. Among these issues, ...
Yi-Lun Pan, Chang-Hsing Wu, Weicheng Huang