Sciweavers

202 search results - page 18 / 41
» Managing Controlled Violation of Temporal Process Constraint...
Sort
View
129
Voted
COMPSAC
2010
IEEE
14 years 10 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
98
Voted
ECOOPW
1999
Springer
15 years 5 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
95
Voted
USENIX
2008
15 years 3 months ago
Remote Profiling of Resource Constraints of Web Servers Using Mini-Flash Crowds
Unexpected surges in Web request traffic can exercise server-side resources (e.g., access bandwidth, processing, storage etc.) in undesirable ways. Administrators today do not hav...
Pratap Ramamurthy, Vyas Sekar, Aditya Akella, Bala...
89
Voted
ICSE
2000
IEEE-ACM
15 years 4 months ago
Software configuration management: a roadmap
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...
Jacky Estublier
98
Voted
RTSS
1998
IEEE
15 years 5 months ago
Statistical Rate Monotonic Scheduling
Statistical Rate Monotonic Scheduling (SRMS) is a generalization of the classical RMS results of Liu and Layland [10] for periodic tasks with highly variable execution times and s...
Alia Atlas, Azer Bestavros