Sciweavers

2834 search results - page 479 / 567
» A Probabilistic Approach to Measuring Robustness in Computin...
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 10 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
SRDS
2005
IEEE
14 years 2 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Interaction-aware energy management for wireless network cards
Wireless Network Interface Cards (WNICs) are part of every portable device, where efficient energy management plays a significant role in extending the device's battery life....
Igor Crk, Mingsong Bi, Chris Gniady
SENSYS
2010
ACM
13 years 7 months ago
Locating sensors in the wild: pursuit of ranging quality
Localization is a fundamental issue of wireless sensor networks that has been extensively studied in the literature. The real-world experience from GreenOrbs, a sensor network sys...
Wei Xi, Yuan He, Yunhao Liu, Jizhong Zhao, Lufeng ...
DRR
2008
13 years 10 months ago
Word segmentation of off-line handwritten documents
Word segmentation is the most critical pre-processing step for any handwritten document recognition/retrieval system. This paper describes an approach to separate a line of uncons...
Chen Huang, Sargur N. Srihari