Sciweavers

804 search results - page 99 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients
Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from oth...
Jun Li, Xun Kang
ECRTS
1999
IEEE
15 years 9 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns
DLOG
2010
15 years 2 months ago
The Logical Difference For Fuzzy EL+ Ontologies
Abstract. Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it i...
Shasha Feng, Yonggang Zhang, Dantong Ouyang, Haiya...
PERCOM
2007
ACM
16 years 4 months ago
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming
Wireless Sensor Networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the re...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 11 months ago
An evolutionary approach to constructive induction for link discovery
This paper presents a genetic programming-based symbolic regression approach to the construction of relational features in link analysis applications. Specifically, we consider t...
Tim Weninger, William H. Hsu, Jing Xia, Waleed Alj...