Sciweavers

17018 search results - page 3312 / 3404
» From the How to the What
Sort
View
ICFP
2010
ACM
13 years 10 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
GRC
2008
IEEE
13 years 10 months ago
Effects of Varying the Delay Distribution in Random, Scale-free, and Small-world Networks
Graph-theory-based approaches have been used with great success when analyzing abstract properties of natural and artificial networks. However, these approaches have not factored...
Bum Soon Jang, Timothy Mann, Yoonsuck Choe
ASUNAM
2010
IEEE
13 years 9 months ago
Product Adoption Networks and Their Growth in a Large Mobile Phone Network
—To understand the diffusive spreading of a product in a telecom network, whether the product is a service, handset, or subscription, it can be very useful to study the structure...
Pal Roe Sundsoy, Johannes Bjelland, Geoffrey Canri...
ATAL
2010
Springer
13 years 9 months ago
Incremental plan aggregation for generating policies in MDPs
Despite the recent advances in planning with MDPs, the problem of generating good policies is still hard. This paper describes a way to generate policies in MDPs by (1) determiniz...
Florent Teichteil-Königsbuch, Ugur Kuter, Gui...
MM
2010
ACM
137views Multimedia» more  MM 2010»
13 years 9 months ago
Self-diagnostic peer-assisted video streaming through a learning framework
Quality control and resource optimization are challenging problems in peer-assisted video streaming systems, due to their large scales and unreliable peer behavior. Such systems a...
Di Niu, Baochun Li, Shuqiao Zhao
« Prev « First page 3312 / 3404 Last » Next »