Sciweavers

914 search results - page 34 / 183
» Effective vaccination policies
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ACL
2010
13 years 7 months ago
The Impact of Interpretation Problems on Tutorial Dialogue
Supporting natural language input may improve learning in intelligent tutoring systems. However, interpretation errors are unavoidable and require an effective recovery policy. We...
Myroslava Dzikovska, Johanna D. Moore, Natalie B. ...
MSS
2003
IEEE
151views Hardware» more  MSS 2003»
14 years 3 months ago
Accurate Modeling of Cache Replacement Policies in a Data Grid
Caching techniques have been used to improve the performance gap of storage hierarchies in computing systems. In data intensive applications that access large data files over wid...
Ekow J. Otoo, Arie Shoshani
CF
2008
ACM
13 years 11 months ago
A distributed evolutionary method to design scheduling policies for volunteer computing
Volunteer Computing (VC) is a paradigm that takes advantage of idle cycles from computing resources donated by volunteers and connected through the Internet to compute large-scale...
Trilce Estrada, Olac Fuentes, Michela Taufer
LISA
2007
14 years 2 days ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar