Sciweavers

19700 search results - page 3877 / 3940
» DNA-Based Computation Times
Sort
View
COMPSAC
2004
IEEE
14 years 18 days ago
Testing Context-Sensitive Middleware-Based Software Applications
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves accor...
T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Ts...
CP
2004
Springer
14 years 18 days ago
ID Walk: A Candidate List Strategy with a Simple Diversification Device
This paper presents a new optimization metaheuristic called ID Walk (Intensification/Diversification Walk) that offers advantages for combining simplicity with effectiveness. In ad...
Bertrand Neveu, Gilles Trombettoni, Fred Glover
CSB
2004
IEEE
135views Bioinformatics» more  CSB 2004»
14 years 18 days ago
Selection of Patient Samples and Genes for Outcome Prediction
Gene expression profiles with clinical outcome data enable monitoring of disease progression and prediction of patient survival at the molecular level. We present a new computatio...
Huiqing Liu, Jinyan Li, Limsoon Wong
CCS
2006
ACM
14 years 17 days ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CCS
2006
ACM
14 years 17 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
« Prev « First page 3877 / 3940 Last » Next »