Sciweavers

6348 search results - page 157 / 1270
» Extensible control architectures
Sort
View
136
Voted
EUROPAR
2009
Springer
15 years 1 months ago
Argument Controlled Profiling
Profiling tools relate measurements to code context such as function names in order to guide code optimization. For a more detailed analysis, call path or phase-based profiling enh...
Tilman Küstner, Josef Weidendorfer, Tobias We...
189
Voted
ECUMN
2004
Springer
15 years 7 months ago
A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision
In a competitive telecommunications marketplace, operators must provide customers with rapid access to both new and traditional service offerings. Market share is developed through...
Daniel Won-Kyu Hong, Choong Seon Hong
PET
2009
Springer
15 years 10 months ago
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests
Many requests that a Web browser makes are not made to the primary site a user is visiting. It is common for websites to instruct browsers to make additional requests to third-part...
Justin Samuel, Beichuan Zhang
130
Voted
BROADNETS
2004
IEEE
15 years 8 months ago
Policy-Based Admission Control in GMPLS Optical Networks
In this paper we present a policy-based admission control architecture responsible for managing the installation and aggregation of packet-based LSPs within lightpaths (optical LS...
Fábio Luciano Verdi, Maurício F. Mag...
MODELS
2007
Springer
15 years 10 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam