Sciweavers

3712 search results - page 509 / 743
» Role-Based Access Control
Sort
View
ICCD
1999
IEEE
115views Hardware» more  ICCD 1999»
15 years 9 months ago
Customization of a CISC Processor Core for Low-Power Applications
This paper describes a core-customization process of a CISC processor core for a given application program. It aims at the power reduction in the CISC processor core by fully util...
You-Sung Chang, Bong-Il Park, In-Cheol Park, Chong...
COBUILD
1999
Springer
15 years 9 months ago
OWL: An Object-Oriented Framework for Intelligent Home and Office Applications
The goal of OWL (Object-Oriented Workplace Laboratory) is to provide an object-oriented and component-based framework that supports the engineering of applications for the design, ...
Bernd Brügge, Ralf Pfleghar, Thomas Reicher
ISCC
1999
IEEE
121views Communications» more  ISCC 1999»
15 years 9 months ago
Customer Service Management: Towards a Management Information Base for an IP Connectivity Service
Customer Service Management (CSM) offers a management interface between customer and service provider, which enables customers to individually monitor and control their subscribed...
Michael Langer, Stefan Loidl, Michael Nerb
ACSAC
1998
IEEE
15 years 9 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer
ICLP
1999
Springer
15 years 9 months ago
Concurrency in Prolog Using Threads and a Shared Database
Concurrency in Logic Programming has received much attention in the past. One problem with many proposals, when applied to Prolog, is that they involve large modifications to the...
Manuel Carro, Manuel V. Hermenegildo