Sciweavers

800 search results - page 67 / 160
» XML access control using static analysis
Sort
View
151
Voted
TMC
2008
210views more  TMC 2008»
15 years 3 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
ICCS
2009
Springer
15 years 10 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
CGO
2004
IEEE
15 years 7 months ago
Software-Controlled Operand-Gating
Operand gating is a technique for improving processor energy efficiency by gating off sections of the data path that are unneeded by short-precision (narrow) operands. A method fo...
Ramon Canal, Antonio González, James E. Smi...
128
Voted
OOPSLA
2004
Springer
15 years 9 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
141
Voted
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
15 years 7 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...