Sciweavers

973 search results - page 136 / 195
» Arguing Using Opponent Models
Sort
View
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
14 years 1 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
PPOPP
2005
ACM
14 years 1 months ago
Energy conservation in heterogeneous server clusters
The previous research on cluster-based servers has focused on homogeneous systems. However, real-life clusters are almost invariably heterogeneous in terms of the performance, cap...
Taliver Heath, Bruno Diniz, Enrique V. Carrera, Wa...
POLICY
2004
Springer
14 years 1 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
ICALT
2003
IEEE
14 years 29 days ago
Adaptive Exploration of Assessment Results under Uncertainty
In the context of Intelligent Learning Environments (ILE), adaptivity plays a key role. In order to achieve adaptive behavior an ILE should have a rich representation of the learn...
Dimitris Lamboudis, Anastasios A. Economides, Anas...
ADBIS
2003
Springer
99views Database» more  ADBIS 2003»
14 years 28 days ago
Towards Collaborative Video Authoring
It’s a long time since video post production became digital, yet the issue of collaborative video authoring has not been seriously investigated so far. In this paper we tackle th...
Boris Novikov, Oleg Proskurnin