Sciweavers

4208 search results - page 785 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SIGSOFT
2006
ACM
14 years 3 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
ICPADS
2005
IEEE
14 years 2 months ago
I/O Processor Allocation for Mesh Cluster Computers
As cluster systems become increasingly popular, more and more parallel applications require need not only computing power but also significant I/O performance. However, the I/O s...
Pangfeng Liu, Chun-Chen Hsu, Jan-Jan Wu
GECCO
2005
Springer
189views Optimization» more  GECCO 2005»
14 years 2 months ago
Molecular programming: evolving genetic programs in a test tube
We present a molecular computing algorithm for evolving DNA-encoded genetic programs in a test tube. The use of synthetic DNA molecules combined with biochemical techniques for va...
Byoung-Tak Zhang, Ha-Young Jang
MM
2004
ACM
129views Multimedia» more  MM 2004»
14 years 2 months ago
A novel log-based relevance feedback technique in content-based image retrieval
Relevance feedback has been proposed as an important technique to boost the retrieval performance in content-based image retrieval (CBIR). However, since there exists a semantic g...
Chu-Hong Hoi, Michael R. Lyu