Sciweavers

1995 search results - page 361 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
140
Voted
POLICY
2001
Springer
15 years 7 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
WCNC
2010
IEEE
15 years 6 months ago
A Lightweight Distributed Solution to Content Replication in Mobile Networks
Abstract—Performance and reliability of content access in mobile networks is conditioned jointly by the number and location of content replicas deployed at the network nodes. The...
C.-A. La, Pietro Michiardi, Claudio Casetti, Carla...
163
Voted
CHI
1995
ACM
15 years 6 months ago
Virtual Reality on a WIM: Interactive Worlds in Miniature
This paper explores a user interface technique which augments an immersive head tracked display with a hand-held miniature copy of the virtual environment. We call this interface ...
Richard Stoakley, Matthew Conway, Randy F. Pausch
151
Voted
DEBS
2008
ACM
15 years 4 months ago
Real-time, load-adaptive processing of continuous queries over data streams
We introduce a new type of query, called a real-time continuous query (RCQ), that captures the real-time requirements of processing data streams. We develop techniques to efficien...
Dhananjay Kulkarni, Chinya V. Ravishankar, Mitch C...
151
Voted
IWCMC
2010
ACM
15 years 2 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...