Sciweavers

389 search results - page 64 / 78
» Metamodeling Autonomic System Management Policies - Ongoing ...
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 3 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
RTSS
2007
IEEE
15 years 3 months ago
Chronos: Feedback Control of a Real Database System Performance
It is challenging to process transactions in a timely fashion using fresh data, e.g., current stock prices, since database workloads may considerably vary due to dynamic data/reso...
Kyoung-Don Kang, Jisu Oh, Sang Hyuk Son
COMPUTER
2002
196views more  COMPUTER 2002»
14 years 9 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...
EOR
2008
123views more  EOR 2008»
14 years 9 months ago
Fixed versus flexible production systems: A real options analysis
In this work, we address investment decisions in production systems by using real options. As is standard in literature, the stochastic variable is assumed to be normally distribu...
Dalila B. M. M. Fontes
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
15 years 27 days ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...