Sciweavers

202 search results - page 18 / 41
» Managing Controlled Violation of Temporal Process Constraint...
Sort
View
COMPSAC
2010
IEEE
14 years 8 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ECOOPW
1999
Springer
15 years 2 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
USENIX
2008
15 years 27 days ago
Remote Profiling of Resource Constraints of Web Servers Using Mini-Flash Crowds
Unexpected surges in Web request traffic can exercise server-side resources (e.g., access bandwidth, processing, storage etc.) in undesirable ways. Administrators today do not hav...
Pratap Ramamurthy, Vyas Sekar, Aditya Akella, Bala...
ICSE
2000
IEEE-ACM
15 years 2 months ago
Software configuration management: a roadmap
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...
Jacky Estublier
RTSS
1998
IEEE
15 years 2 months ago
Statistical Rate Monotonic Scheduling
Statistical Rate Monotonic Scheduling (SRMS) is a generalization of the classical RMS results of Liu and Layland [10] for periodic tasks with highly variable execution times and s...
Alia Atlas, Azer Bestavros