Sciweavers

376 search results - page 30 / 76
» Integrity constraints in trust management
Sort
View
CODES
2001
IEEE
15 years 5 months ago
A constraint-based application model and scheduling techniques for power-aware systems
New embedded systems must be power-aware, not just low-power. That is, they must track their power sources and the changingpower and performance constraints imposed by the environ...
Jinfeng Liu, Pai H. Chou, Nader Bagherzadeh, Fadi ...
CMOT
2000
128views more  CMOT 2000»
15 years 1 months ago
Ontologies to Support Process Integration in Enterprise Engineering
Enterprise design knowledge is currently descriptive, ad hoc, or pre-scientific. One reason for this state of affairs in enterprise design is that existing approaches lack an adeq...
Michael Grüninger, Katy Atefi, Mark S. Fox
ER
2004
Springer
169views Database» more  ER 2004»
15 years 7 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
SCS
2004
15 years 3 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay
POPL
1999
ACM
15 years 6 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett