Sciweavers

2954 search results - page 67 / 591
» Beyond
Sort
View
DEXAW
2004
IEEE
109views Database» more  DEXAW 2004»
14 years 1 months ago
Internet, GRID, Self-Adaptability and Beyond: Are We Ready?
This paper reflects different understanding and positions on future trends of GRID-oriented technologies, applications, and networks, as perceived by representatives from industry...
Petre Dini, Wolfgang Gentzsch, Mark Potts, Alexand...
CCS
2006
ACM
14 years 1 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
DAGM
2006
Springer
14 years 1 months ago
Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels
Kernel functions as similarity measures for sequential data have been extensively studied in previous research. This contribution addresses the efficient computation of distance fu...
Konrad Rieck, Pavel Laskov, Klaus-Robert Müll...
ECAI
2006
Springer
14 years 1 months ago
Beyond Singleton Arc Consistency
Shaving algorithms, like singleton arc consistency (sac), are currently receiving much interest. They remove values which are not part of any solution. This paper proposes an effic...
Marc R. C. van Dongen
APCSAC
2001
IEEE
14 years 1 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose