Sciweavers

800 search results - page 136 / 160
» XML access control using static analysis
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 3 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
EOR
2008
66views more  EOR 2008»
14 years 10 months ago
Multiple goals and ownership structure: Effects on the performance of Spanish savings banks
Spanish savings banks (SBs) are financial institutions with a wide mission that includes different stakeholders' goals. Profit maximization is only one among several goals, a...
Miguel García-Cestona, Jordi Surroca
101
Voted
WIOPT
2011
IEEE
14 years 1 months ago
Network utility maximization over partially observable Markovian channels
Abstract—This paper considers maximizing throughput utility in a multi-user network with partially observable Markov ON/OFF channels. Instantaneous channel states are never known...
Chih-Ping Li, Michael J. Neely
PPOPP
2010
ACM
14 years 8 months ago
Analyzing lock contention in multithreaded applications
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...
85
Voted
HYBRID
2010
Springer
15 years 3 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...