Sciweavers

798 search results - page 75 / 160
» Comparing the expressive power of access control models
Sort
View
CIKM
2006
Springer
14 years 22 days ago
Mining coherent patterns from heterogeneous microarray data
Microarray technology is a powerful tool for geneticists to monitor interactions among tens of thousands of genes simultaneously. There has been extensive research on coherent sub...
Xiang Zhang, Wei Wang 0010
ANSS
2006
IEEE
14 years 3 months ago
Performance Modeling and Evaluation of E-Business Systems
A general model of an E-business system comprising an Application Server and a Database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for ...
Giovanna Ferrari, Paul D. Ezhilchelvan, Isi Mitran...
INFORMS
2010
75views more  INFORMS 2010»
13 years 6 months ago
Improving the Efficiency and Efficacy of Controlled Sequential Bifurcation for Simulation Factor Screening
Controlled Sequential Bifurcation (CSB) is a factor-screening method for discrete-event simulations. It combines a multi-stage hypothesis testing procedure with the original Seque...
Hong Wan, Bruce E. Ankenman, Barry L. Nelson
AUTOMATICA
2008
89views more  AUTOMATICA 2008»
13 years 9 months ago
Dynamic buffer management using optimal control of hybrid systems
This paper studies a general dynamic buffer management problem with one buffer inserted between two interacting components. The component to be controlled is assumed to have multi...
Wei Zhang, Jianghai Hu
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 1 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian