Sciweavers

1664 search results - page 266 / 333
» Making a Case for Multi-Agent Systems
Sort
View
96
Voted
OSDI
2002
ACM
16 years 26 days ago
Cooperative I/O: A Novel I/O Semantics for Energy-Aware Applications
In this paper we demonstrate the benefits of application involvement in operating system power management. We present Coop-I/O, an approach to reduce the power consumption of devi...
Andreas Weissel, Bjórn Beutel, Frank Bellos...
IMC
2006
ACM
15 years 6 months ago
On the impact of research network based testbeds on wide-area experiments
An important stage of wide-area systems and networking research is to prototype a system to understand its performance when deployed in the real Internet. A key requirement of pro...
Himabindu Pucha, Y. Charlie Hu, Zhuoqing Morley Ma...
125
Voted
SACMAT
2006
ACM
15 years 6 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 6 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
97
Voted
FOSSACS
2005
Springer
15 years 6 months ago
Model Checking for Nominal Calculi
Nominal calculi have been shown very effective to formally model a variety of computational phenomena. The models of nominal calculi have often infinite states, thus making model ...
Gian Luigi Ferrari, Ugo Montanari, Emilio Tuosto