Sciweavers

1034 search results - page 159 / 207
» Dynamic Access Control Framework Based On Events
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 6 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
ENTCS
2008
130views more  ENTCS 2008»
15 years 2 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
AIPS
2006
15 years 3 months ago
Knowledge-based Middleware as an Architecture for Planning and Scheduling Systems
We present an architecture that provides a robust, scalable and flexible software framework for planning and scheduling systems through the use of standardized industrial-strength...
Bernd Schattenberg, Steffen Balzer, Susanne Biundo
PODC
1994
ACM
15 years 6 months ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes
GECCO
2008
Springer
177views Optimization» more  GECCO 2008»
15 years 3 months ago
Reduced computation for evolutionary optimization in noisy environment
Evolutionary Algorithms’ (EAs’) application to real world optimization problems often involves expensive fitness function evaluation. Naturally this has a crippling effect on ...
Maumita Bhattacharya