Sciweavers

400 search results - page 47 / 80
» Implementing responsibility for states and events
Sort
View
121
Voted
SACMAT
2006
ACM
15 years 6 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
INFOCOM
2007
IEEE
15 years 6 months ago
Empirical Evaluation of Techniques for Measuring Available Bandwidth
Abstract— The ability to measure end-to-end Available Bandwidth (AB) on a network path is useful in several domains, including overlay-routing infrastructure, network monitoring,...
Alok Shriram, Jasleen Kaur
94
Voted
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
15 years 5 months ago
Kinetic perturbations as robustness analysis tool for biochemical reaction networks
— Models of biochemical reaction networks can be decomposed into a stoichiometric part and a kinetic part. The stoichiometric part describes the structural mass flows while the ...
Steffen Waldherr, Frank Allgöwer, Elling W. J...
ASPDAC
2000
ACM
97views Hardware» more  ASPDAC 2000»
15 years 4 months ago
Symbolic debugging of globally optimized behavioral specifications
Symbolic debuggers are system development tools that can accelerate the validation speed of behavioral specifications by allowing a user to interact with an executing code at the ...
Inki Hong, Darko Kirovski, Miodrag Potkonjak, Mari...
CCGRID
2011
IEEE
14 years 4 months ago
Towards Real-Time, Volunteer Distributed Computing
Many large-scale distributed computing applications demand real-time responses by soft deadlines. To enable such real-time task distribution and execution on the volunteer resourc...
Sangho Yi, Emmanuel Jeannot, Derrick Kondo, David ...