Sciweavers

5757 search results - page 77 / 1152
» Dynamic Policy Programming
Sort
View
231
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 2 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
113
Voted
ISCI
2008
96views more  ISCI 2008»
15 years 2 months ago
Fuzzy age-dependent replacement policy and SPSA algorithm based-on fuzzy simulation
An increase in the performance of deteriorating systems can be achieved through the adoption of suitable maintenance policies. One of the most popular maintenance policies is the ...
Jiashun Zhang, Ruiqing Zhao, Wansheng Tang
145
Voted
TVLSI
2008
85views more  TVLSI 2008»
15 years 2 months ago
Low-Complexity Policies for Energy-Performance Tradeoff in Chip-Multi-Processors
Chip-Multi-Processors (CMP) utilize multiple energy-efficient Processing Elements (PEs) to deliver high performance while maintaining an efficient ratio of performance to energy-c...
A. Elyada, Ran Ginosar, Uri Weiser
253
Voted
ECOOP
2009
Springer
16 years 3 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...
126
Voted
CF
2009
ACM
15 years 9 months ago
A light-weight fairness mechanism for chip multiprocessor memory systems
Chip Multiprocessor (CMP) memory systems suffer from the effects of destructive thread interference. This interference reduces performance predictability because it depends heavil...
Magnus Jahre, Lasse Natvig