Sciweavers

630 search results - page 51 / 126
» Acceptable internet use policy
Sort
View
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
14 years 1 months ago
GAINS: genetic algorithms for increasing net sales of a mobile reverse demand communication system
In this paper, I describe MRDCOM, a mobile reverse-demand communication system for the pizza industry. The web-based system will support student (buyer) sign-up and will be capabl...
Michael Henry Wolk
JSAC
2011
123views more  JSAC 2011»
12 years 10 months ago
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
—The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems...
Srinivas Shakkottai, R. Srikant, Lei Ying
VLDB
2004
ACM
113views Database» more  VLDB 2004»
14 years 1 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
IPPS
1998
IEEE
13 years 12 months ago
An Efficient RMS Admission Control and Its Application to Multiprocessor Scheduling
A real-time system must execute functionally correct computations in a timely manner. In order to guarantee that all tasks accepted in the system will meet their timing requiremen...
Sylvain Lauzac, Rami G. Melhem, Daniel Mossé...
ESWS
2007
Springer
14 years 1 months ago
Simple Algorithms for Predicate Suggestions Using Similarity and Co-occurrence
Abstract When creating Semantic Web data, users have to make a critical choice for a vocabulary: only through shared vocabularies can meaning be established. A centralised policy p...
Eyal Oren, Sebastian Gerke, Stefan Decker