Sciweavers

591 search results - page 21 / 119
» Embracing policy engineering
Sort
View
PPPJ
2004
ACM
15 years 3 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
WOSP
2000
ACM
15 years 2 months ago
Analytic modeling of load balancing policies for tasks with heavy-tailed distributions
We present an analytic technique for modeling load balancing policies on a cluster of servers conditioned on the fact that the service times of arriving tasks are drawn from heavy...
Alma Riska, Evgenia Smirni, Gianfranco Ciardo
EUROMICRO
2009
IEEE
15 years 1 months ago
Fault-Tolerant BPEL Workflow Execution via Cloud-Aware Recovery Policies
BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications tha...
Ernst Juhnke, Tim Dörnemann, Bernd Freisleben
ICST
2008
IEEE
15 years 4 months ago
Model-Based Tests for Access Control Policies
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...
OSS
2007
Springer
15 years 3 months ago
Free/Open Source Software Adoption, Public Policies and Development Indicators: An International Comparison
Despite the growing body of research on inner workings of FOSS development, there are few studies on its relation with broader developments in society. In this study we have attemp...
Harald Schmidbauer, Mehmet Gençer, Vehbi Si...