Sciweavers

977 search results - page 50 / 196
» Soft Constraints for Security
Sort
View
VLSID
2009
IEEE
143views VLSI» more  VLSID 2009»
15 years 10 months ago
SACR: Scheduling-Aware Cache Reconfiguration for Real-Time Embedded Systems
Dynamic reconfiguration techniques are widely used for efficient system optimization. Dynamic cache reconfiguration is a promising approach for reducing energy consumption as well...
Weixun Wang, Prabhat Mishra, Ann Gordon-Ross
IPPS
1999
IEEE
15 years 2 months ago
Exploiting Application Tunability for Efficient, Predictable Parallel Resource Management
Parallel computing is becoming increasing central and mainstream, driven both by the widespread availability of commodity SMP and high-performance cluster platforms, as well as th...
Fangzhe Chang, Vijay Karamcheti, Zvi M. Kedem
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
15 years 10 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
SACMAT
2003
ACM
15 years 3 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
COMPSAC
2009
IEEE
15 years 4 months ago
Real-Time Guarantees in Flexible Advance Reservations
—This paper deals with the problem of scheduling workflow applications with Quality of Service (QoS) constraints, comprising real-time and interactivity constraints, over a servi...
Kleopatra Konstanteli, Dimosthenis Kyriazis, Theod...