Sciweavers

3902 search results - page 600 / 781
» Hardware Synthesis from C C Models
Sort
View
CSFW
2006
IEEE
15 years 10 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
SIBGRAPI
2006
IEEE
15 years 10 months ago
Improving 2D mesh image segmentation with Markovian Random Fields
Traditional mesh segmentation methods normally operate on geometrical models with no image information. On the other hand, 2D image-based mesh generation and segmentation counterp...
Alex Jesus Cuadros-Vargas, Leandro C. Gerhardinger...
ACMSE
2006
ACM
15 years 10 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
IMC
2006
ACM
15 years 10 months ago
Web search clickstreams
Search engines are a vital part of the Web and thus the Internet infrastructure. Therefore understanding the behavior of users searching the Web gives insights into trends, and en...
Nils Kammenhuber, Julia Luxenburger, Anja Feldmann...
125
Voted
IUI
2005
ACM
15 years 10 months ago
Adaptive teaching strategy for online learning
Finding the optimal teaching strategy for an individual student is difficult even for an experienced teacher. Identifying and incorporating multiple optimal teaching strategies fo...
Jungsoon P. Yoo, Cen Li, Chrisila C. Pettey