Sciweavers

798 search results - page 95 / 160
» Comparing the expressive power of access control models
Sort
View
CSC
2010
13 years 4 months ago
Performance Modeling, Analysis, and Optimization of Cell-List Based Molecular Dynamics
- We have developed a performance prediction model for non-bonded interaction computations in molecular dynamics simulations, thereby predicting the optimal cell dimension in a lin...
Manaschai Kunaseth, Rajiv K. Kalia, Aiichiro Nakan...
ITIIS
2010
154views more  ITIIS 2010»
13 years 3 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
CCS
2005
ACM
14 years 2 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
SBP
2012
Springer
12 years 4 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
14 years 6 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...