Sciweavers

14850 search results - page 2852 / 2970
» A Geometric Approach to Betweenness
Sort
View
USENIX
2007
15 years 6 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
USENIX
2007
15 years 6 months ago
MapJAX: Data Structure Abstractions for Asynchronous Web Applications
Data Structure Abstractions for Asynchronous Web Applications Daniel S. Myers MIT CSAIL Jennifer N. Carlisle MIT CSAIL James A. Cowling MIT CSAIL Barbara H. Liskov MIT CSAIL The c...
Daniel S. Myers, Jennifer N. Carlisle, James A. Co...
APPROX
2008
Springer
89views Algorithms» more  APPROX 2008»
15 years 6 months ago
Santa Claus Meets Hypergraph Matchings
We consider the problem of max-min fair allocation of indivisible goods. Our focus will be on the restricted version of the problem in which there are m items, each of which assoc...
Arash Asadpour, Uriel Feige, Amin Saberi
ARC
2008
Springer
95views Hardware» more  ARC 2008»
15 years 6 months ago
The Instruction-Set Extension Problem: A Survey
Over the last years, we have witnessed the increased use of Application-Specific Instruction-Set Processors (ASIPs). These ASIPs are processors that have a customizable instruction...
Carlo Galuzzi, Koen Bertels
ARGMAS
2008
Springer
15 years 6 months ago
Co-ordination and Co-operation in Agent Systems: Social Laws and Argumentation
The social laws paradigm represents an important approach to the co-ordination of behaviour in multi-agent systems. In this paper we examine the relationship between social laws an...
Katie Atkinson, Trevor J. M. Bench-Capon
« Prev « First page 2852 / 2970 Last » Next »