Sciweavers

2256 search results - page 133 / 452
» The Modeling for Dynamic Power Management of Embedded System...
Sort
View
CCS
2004
ACM
15 years 7 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
ISDO
2000
194views Business» more  ISDO 2000»
15 years 3 months ago
Contract-Based Transaction Management in Cross-Organizational Workflow Management
Cross-organizational workflow management is an essential ingredient for process integration in virtual enterprises. To obtain cross-organizational workflow processes with robust s...
Paul W. P. J. Grefen
ASYNC
2005
IEEE
112views Hardware» more  ASYNC 2005»
15 years 7 months ago
Request-Driven GALS Technique for Wireless Communication System
A Globally Asynchronous - Locally Synchronous (GALS) technique for application in wireless communication systems is proposed and evaluated. The GALS wrappers are based on a reques...
Milos Krstic, Eckhard Grass, Christian Stahl
CIDR
2011
233views Algorithms» more  CIDR 2011»
14 years 5 months ago
Ibis: A Provenance Manager for Multi-Layer Systems
End-to-end data processing environments are often comprised of several independently-developed (sub-)systems, e.g. for engineering, organizational or historical reasons. Unfortuna...
Christopher Olston, Anish Das Sarma
ADC
2006
Springer
135views Database» more  ADC 2006»
15 years 8 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...