Sciweavers

3375 search results - page 559 / 675
» Resource Sharing in Performance Models
Sort
View
CBSE
2011
Springer
14 years 4 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale
ISW
2009
Springer
15 years 10 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
163
Voted
XMLSEC
2003
ACM
15 years 9 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
190
Voted
FASE
2008
Springer
15 years 5 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
TVCG
2011
198views more  TVCG 2011»
14 years 11 months ago
Forecasting Hotspots - A Predictive Analytics Approach
—Current visual analytics systems provide users with the means to explore trends in their data. Linked views and interactive displays provide insight into correlations among peop...
Ross Maciejewski, Ryan Hafen, Stephen Rudolph, Ste...