Sciweavers

914 search results - page 148 / 183
» Effective vaccination policies
Sort
View
ATC
2009
Springer
14 years 14 days ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen
ATAL
2006
Springer
14 years 6 days ago
Solving POMDPs using quadratically constrained linear programs
Developing scalable algorithms for solving partially observable Markov decision processes (POMDPs) is an important challenge. One promising approach is based on representing POMDP...
Christopher Amato, Daniel S. Bernstein, Shlomo Zil...
CASES
2006
ACM
14 years 6 days ago
Power efficient branch prediction through early identification of branch addresses
Ever increasing performance requirements have elevated deeply pipelined architectures to a standard even in the embedded processor domain, requiring the incorporation of dynamic b...
Chengmo Yang, Alex Orailoglu
CIKM
2006
Springer
14 years 6 days ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
EUC
2006
Springer
14 years 4 days ago
Optimizing Scheduling Stability for Runtime Data Alignment
Runtime data alignment has been paid attention recently since it can allocate data segment to processors dynamically according to applications' requirement. One of the key opt...
Ching-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen