Sciweavers

2256 search results - page 282 / 452
» The Modeling for Dynamic Power Management of Embedded System...
Sort
View
FEDCSIS
2011
90views more  FEDCSIS 2011»
14 years 3 months ago
Services Composition Model for Home-Automation peer-to-peer Pervasive Computing
—Collaborative mechanisms between services are a crucial aspect in the recent development of pervasive computing systems based on the paradigm of service-oriented architecture. C...
Juan A. Holgado-Terriza, Sandra Rodríguez-V...
DIMVA
2009
15 years 4 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
SAC
2005
ACM
15 years 9 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
KDD
2009
ACM
166views Data Mining» more  KDD 2009»
16 years 4 months ago
Measuring the effects of preprocessing decisions and network forces in dynamic network analysis
Social networks have become a major focus of research in recent years, initially directed towards static networks but increasingly, towards dynamic ones. In this paper, we investi...
Jerry Scripps, Pang-Ning Tan, Abdol-Hossein Esfaha...
PPOPP
2006
ACM
15 years 9 months ago
Performance evaluation of adaptive MPI
Processor virtualization via migratable objects is a powerful technique that enables the runtime system to carry out intelligent adaptive optimizations like dynamic resource manag...
Chao Huang, Gengbin Zheng, Laxmikant V. Kalé...