Sciweavers

226 search results - page 23 / 46
» Counting Models using Extension Rules
Sort
View
LISA
2007
13 years 10 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
WWW
2010
ACM
14 years 2 months ago
Exploring web scale language models for search query processing
It has been widely observed that search queries are composed in a very different style from that of the body or the title of a document. Many techniques explicitly accounting for...
Jian Huang 0002, Jianfeng Gao, Jiangbo Miao, Xiaol...
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
13 years 12 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
COORDINATION
2008
Springer
13 years 9 months ago
Actors with Multi-headed Message Receive Patterns
Abstract. The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Er...
Martin Sulzmann, Edmund S. L. Lam, Peter Van Weert
WSC
2008
13 years 10 months ago
Unifying simulation and optimization of strategic sourcing and transportation
Proposed and developed is a framework and an extensible library of simulation modeling components for strategic sourcing and transportation. The components include items, supplier...
Malak Al-Nory, Alexander Brodsky