Sciweavers

27 search results - page 5 / 6
» Specification and Analysis of Dynamic Authorisation Policies
Sort
View
JDCTA
2010
111views more  JDCTA 2010»
14 years 4 months ago
Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism
The wide diffusion of new technologies in communication and business has changed how consumer and product/store knowledge has to be managed and represented digitally. This issue h...
Pierpaolo Singer, Maria Antonella Ferri, Lucia Aie...
CCR
2004
151views more  CCR 2004»
14 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
75
Voted
HPCA
2007
IEEE
15 years 9 months ago
Exploiting Postdominance for Speculative Parallelization
Task-selection policies are critical to the performance of any architecture that uses speculation to extract parallel tasks from a sequential thread. This paper demonstrates that ...
Mayank Agarwal, Kshitiz Malik, Kevin M. Woley, Sam...
CF
2006
ACM
15 years 3 months ago
Dynamic thread assignment on heterogeneous multiprocessor architectures
In a multi-programmed computing environment, threads of execution exhibit different runtime characteristics and hardware resource requirements. Not only do the behaviors of distin...
Michela Becchi, Patrick Crowley
EOR
2008
123views more  EOR 2008»
14 years 9 months ago
Fixed versus flexible production systems: A real options analysis
In this work, we address investment decisions in production systems by using real options. As is standard in literature, the stochastic variable is assumed to be normally distribu...
Dalila B. M. M. Fontes