Sciweavers

196 search results - page 35 / 40
» A Hacking View of Access Control
Sort
View
CHI
2004
ACM
14 years 10 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
SOSP
2001
ACM
14 years 6 months ago
BASE: Using Abstraction to Improve Fault Tolerance
ing Abstraction to Improve Fault Tolerance MIGUEL CASTRO Microsoft Research and RODRIGO RODRIGUES and BARBARA LISKOV MIT Laboratory for Computer Science Software errors are a major...
Rodrigo Rodrigues, Miguel Castro, Barbara Liskov
INFOCOM
2008
IEEE
14 years 4 months ago
A Distributed Optimization Algorithm for Multi-Hop Cognitive Radio Networks
Cognitive radio (CR) is a revolution in radio technology and is viewed as an enabling technology for dynamic spectrum access. This paper investigates how to design distributed alg...
Yi Shi, Y. Thomas Hou
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
14 years 4 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
COMPUTER
2004
105views more  COMPUTER 2004»
13 years 9 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...