Conferences related to Permission

Back to Top

2013 International Symposium on Theoretical Aspects of Software Engineering (TASE)

Theoretical Aspects of Software Engineering

  • 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE)

    Large scale software systems are of growing concern to academia and industry. This poses new challenges to the various aspects of software engineering, for instance, the reliability of software development, Web-oriented software architecture and aspect and object-orientation techniques. New concepts and methodologies are required to enhance the development of SE from theoretical aspects. TASE 2012 is a forum for researchers to present ideas, results, and ongoing research on theoretical advances in SE.

  • 2011 IEEE 5th International Symposium on Theoretical Aspects of Software Engineering (TASE)

    TASE 2011 aims to become a forum for the presentation and discussion of new fundamental ideas in software engineering of large-scale systems.

  • 2010 4th IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE)

    automata logics set theory type theory process algebrae probability game theory theorem-proving model-checking simulation-checking testing simulation requirements engineering specification Model-Driven Engineering software architectures and synthesis aspect and object orientation embedded and real-time systems software processes and workflows component-based software engineering software safety, security and reliability reverse engineering and software maintenance

  • 2009 3rd IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE)

    Large scale software systems and the Internet are of growing concern to academia and industry. This poses new challenges to the various aspects of software engineering, for instance, the reliability of software development, web-oriented software architecture and aspect and object-orientation techniques. As a result, new concepts and methodologies are required to enhance the development of software engineering from theoretical aspects. TASE 2009 is a forum for researchers from academia, industry and governme

  • 2008 2nd IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering (TASE)

    TASE 2008 is a forum for researchers from academia, industry and government to present ideas, results, and ongoing research on theoretical advances in software engineering.


2012 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY

The symposium brings together researchers and practitioners working on policy-based systems across a wide range of application domains including policy-based networking, privacy, trust and security management, autonomic computing, pervasive systems and enterprise systems. POLICY 2012 is the 13th in a series of successful events, which have provided a forum for discussion and collaboration between researchers, developers and users of policy-based systems.


2011 3rd International Conference on Multimedia Information Networking and Security (MINES)

Multimedia computing and intelligence Information networking and communication Service science and Intelligence Multimedia information security Communication and network security


2010 2nd International Conference on Information Science and Engineering (ICISE)

ICISE2010 aims to provide a high-level international forum for researchers and engineers to present and discuss recent advances and new techniques in information processing technology.

  • 2009 1st International Conference on Information Science and Engineering (ICISE)

    Computer Science, Information Technology, Information Engineering



Periodicals related to Permission

Back to Top

Latin America Transactions, IEEE (Revista IEEE America Latina)

The IEEE Region 9 is releasing the IEEE Latin America Transactions to enable the publication of non-published and technically excellent papers from Latin American engineers, in Spanish or Portuguese languages. Engineers and researchers from Portugal and Spain (and others countries with the same language) are also very welcome to submit their proposals.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.




Xplore Articles related to Permission

Back to Top

Fast performance-driven optimization for buffered clock trees based on Lagrangian relaxation

Chung-Ping Chen; Yao-Wen Chang; D. F. Wong 33rd Design Automation Conference Proceedings, 1996, 1996

Delay, power, skew, area, and sensitivity are the most important concerns in current clock-tree design. We present in this paper an algorithm for simultaneously optimizing the above objectives by sizing wires and buffers in clock trees. Our algorithm, based on Lagrangian relaxation method, can optimally minimize delay, power, and area simultaneously with very low skew and sensitivity. With linear storage ...


Constructing lower and upper bounded delay routing trees using linear programming

Jaewon Oh; Iksoo Pyo; M. Pedram 33rd Design Automation Conference Proceedings, 1996, 1996

This paper presents a new approach for solving the Lower and Upper Bounded delay routing Tree (LUBT) problem using linear programming. LUBT is a Steiner tree rooted at the source node such that delays from the source to sink nodes lie between the given lower and upper bounds. We show that our proposed method produces minimum cost LUBT for a ...


On the minimality of testing for rights in transformation models

R. S. Sandhu; S. Ganta Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Defines and analyzes a family of access control models, called transformation models, which are based on the concept of transformation of rights. In these models, propagation of access rights is authorized entirely by existing rights for the object in question. Transformation models are useful for expressing various kinds of consistency, confidentiality, and integrity controls. These models also generalize the monotonic ...


New performance driven routing techniques with explicit area/delay tradeoff and simultaneous wire sizing

J. Lillis; Chung-Kuan Cheng; Ting-Ting Y. Lin; Ching-Yen Ho 33rd Design Automation Conference Proceedings, 1996, 1996

We present new algorithms for construction of performance driven Rectilinear Steiner Trees under the Elmore delay model. Our algorithms represent a departure from previous approaches in that we derive an explicit area/delay trade-off curve. We achieve this goal by limiting the solution space to the set of topologies induced by a permutation on the sinks of the net. This constraint ...


Organic computing - on the feasibility of controlled emergence

C. Muller-Schloer International Conference on Hardware/Software Codesign and System Synthesis, 2004. CODES + ISSS 2004., 2004

This work gives an introduction to the research area of organic computing and shows chances, opportunities and problems currently tackled by researchers. First the visions that lead to this research area are discussed briefly. It is shown that the notion of emergence, a central phenomenon in organic computing, is a typical bottom-up effect with the interesting property of generating order ...


More Xplore Articles

Educational Resources on Permission

Back to Top

eLearning

Fast performance-driven optimization for buffered clock trees based on Lagrangian relaxation

Chung-Ping Chen; Yao-Wen Chang; D. F. Wong 33rd Design Automation Conference Proceedings, 1996, 1996

Delay, power, skew, area, and sensitivity are the most important concerns in current clock-tree design. We present in this paper an algorithm for simultaneously optimizing the above objectives by sizing wires and buffers in clock trees. Our algorithm, based on Lagrangian relaxation method, can optimally minimize delay, power, and area simultaneously with very low skew and sensitivity. With linear storage ...


Constructing lower and upper bounded delay routing trees using linear programming

Jaewon Oh; Iksoo Pyo; M. Pedram 33rd Design Automation Conference Proceedings, 1996, 1996

This paper presents a new approach for solving the Lower and Upper Bounded delay routing Tree (LUBT) problem using linear programming. LUBT is a Steiner tree rooted at the source node such that delays from the source to sink nodes lie between the given lower and upper bounds. We show that our proposed method produces minimum cost LUBT for a ...


On the minimality of testing for rights in transformation models

R. S. Sandhu; S. Ganta Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Defines and analyzes a family of access control models, called transformation models, which are based on the concept of transformation of rights. In these models, propagation of access rights is authorized entirely by existing rights for the object in question. Transformation models are useful for expressing various kinds of consistency, confidentiality, and integrity controls. These models also generalize the monotonic ...


New performance driven routing techniques with explicit area/delay tradeoff and simultaneous wire sizing

J. Lillis; Chung-Kuan Cheng; Ting-Ting Y. Lin; Ching-Yen Ho 33rd Design Automation Conference Proceedings, 1996, 1996

We present new algorithms for construction of performance driven Rectilinear Steiner Trees under the Elmore delay model. Our algorithms represent a departure from previous approaches in that we derive an explicit area/delay trade-off curve. We achieve this goal by limiting the solution space to the set of topologies induced by a permutation on the sinks of the net. This constraint ...


Organic computing - on the feasibility of controlled emergence

C. Muller-Schloer International Conference on Hardware/Software Codesign and System Synthesis, 2004. CODES + ISSS 2004., 2004

This work gives an introduction to the research area of organic computing and shows chances, opportunities and problems currently tackled by researchers. First the visions that lead to this research area are discussed briefly. It is shown that the notion of emergence, a central phenomenon in organic computing, is a typical bottom-up effect with the interesting property of generating order ...


More eLearning Resources

IEEE-USA E-Books



Standards related to Permission

Back to Top

No standards are currently tagged "Permission"


Jobs related to Permission

Back to Top