Sciweavers

2834 search results - page 479 / 567
» A Probabilistic Approach to Measuring Robustness in Computin...
Sort
View
147
Voted
DBSEC
2000
138views Database» more  DBSEC 2000»
15 years 5 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
126
Voted
SRDS
2005
IEEE
15 years 9 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
124
Voted
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Interaction-aware energy management for wireless network cards
Wireless Network Interface Cards (WNICs) are part of every portable device, where efficient energy management plays a significant role in extending the device's battery life....
Igor Crk, Mingsong Bi, Chris Gniady
122
Voted
SENSYS
2010
ACM
15 years 1 months ago
Locating sensors in the wild: pursuit of ranging quality
Localization is a fundamental issue of wireless sensor networks that has been extensively studied in the literature. The real-world experience from GreenOrbs, a sensor network sys...
Wei Xi, Yuan He, Yunhao Liu, Jizhong Zhao, Lufeng ...
158
Voted
DRR
2008
15 years 5 months ago
Word segmentation of off-line handwritten documents
Word segmentation is the most critical pre-processing step for any handwritten document recognition/retrieval system. This paper describes an approach to separate a line of uncons...
Chen Huang, Sargur N. Srihari