Sciweavers

1034 search results - page 159 / 207
» Dynamic Access Control Framework Based On Events
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 12 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
ENTCS
2008
130views more  ENTCS 2008»
13 years 8 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
AIPS
2006
13 years 9 months ago
Knowledge-based Middleware as an Architecture for Planning and Scheduling Systems
We present an architecture that provides a robust, scalable and flexible software framework for planning and scheduling systems through the use of standardized industrial-strength...
Bernd Schattenberg, Steffen Balzer, Susanne Biundo
PODC
1994
ACM
14 years 4 days ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes
GECCO
2008
Springer
177views Optimization» more  GECCO 2008»
13 years 9 months ago
Reduced computation for evolutionary optimization in noisy environment
Evolutionary Algorithms’ (EAs’) application to real world optimization problems often involves expensive fitness function evaluation. Naturally this has a crippling effect on ...
Maumita Bhattacharya