Sciweavers

43264 search results - page 8584 / 8653
» Comparing models of computation
Sort
View
SAC
2009
ACM
14 years 2 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
SACMAT
2009
ACM
14 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
EDBT
2009
ACM
277views Database» more  EDBT 2009»
14 years 2 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 2 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
14 years 2 months ago
Nash Dynamics in Constant Player and Bounded Jump Congestion Games
We study the convergence time of Nash dynamics in two classes of congestion games – constant player congestion games and bounded jump congestion games. It was shown by Ackermann ...
Tanmoy Chakraborty, Sanjeev Khanna
« Prev « First page 8584 / 8653 Last » Next »