Sciweavers

798 search results - page 65 / 160
» Comparing the expressive power of access control models
Sort
View
EDBTW
2006
Springer
14 years 19 days ago
Models for Incomplete and Probabilistic Information
Abstract. We discuss, compare and relate some old and some new models for incomplete and probabilistic databases. We characterize the expressive power of c-tables over infinite dom...
Todd J. Green, Val Tannen
CIVR
2004
Springer
111views Image Analysis» more  CIVR 2004»
14 years 2 months ago
An Inference Network Approach to Image Retrieval
Most image retrieval systems only allow a fragment of text or an example image as a query. Most users have more complex information needs that are not easily expressed in either of...
Donald Metzler, R. Manmatha
VTC
2007
IEEE
14 years 3 months ago
Power Fairness in a Scalable Ring-Based Wireless Mesh Network
—The wireless mesh network (WMN) is an essential low-power solution to support ubiquitous broadband services. However, mesh networks face the power unfairness and throughput bott...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang
SIGMETRICS
2012
ACM
290views Hardware» more  SIGMETRICS 2012»
11 years 11 months ago
Power and energy containers for multicore servers
Energy efficiency and power capping remain growing concerns in server systems. Online applications continue to evolve with new features and dynamic clientdirected processing, res...
Kai Shen, Arrvindh Shriraman, Sandhya Dwarkadas, X...
CHI
2011
ACM
13 years 17 days ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...