Sciweavers

514 search results - page 85 / 103
» Flexible OS Support and Applications for Trusted Computing
Sort
View
ICTAI
2009
IEEE
15 years 6 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
RSP
2008
IEEE
118views Control Systems» more  RSP 2008»
15 years 6 months ago
Functional DIF for Rapid Prototyping
Dataflow formalisms have provided designers of digital signal processing systems with optimizations and guarantees to arrive at quality prototypes quickly. As system complexity in...
William Plishker, Nimish Sane, Mary Kiemb, Kapil A...
WETICE
2008
IEEE
15 years 6 months ago
Wolf - An Eclipse Plug-In for WADE
This paper describes WOLF, a development environment for WADE-based applications. WADE is a software platform, based on JADE, a popular Open Source framework, for the development ...
Giovanni Caire, Marisa Porta, Elena Quarantotto, G...
ESCIENCE
2006
IEEE
15 years 5 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
IPPS
1998
IEEE
15 years 4 months ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre