Sciweavers

1818 search results - page 128 / 364
» How users use access control
Sort
View
ASPDAC
2007
ACM
144views Hardware» more  ASPDAC 2007»
14 years 1 months ago
Control-Flow Aware Communication and Conflict Analysis of Parallel Processes
In this paper, we present an approach for control-flow aware communication and conflict analysis of systems of parallel communicating processes. This approach allows to determine ...
Axel Siebenborn, Alexander Viehl, Oliver Bringmann...
BCSHCI
2009
13 years 10 months ago
An evaluation of a meal planning system: ease of use and perceived usefulness
Unhealthy eating is an increasingly important problem in the western society. Our approach to this problem is to provide a meal planning system giving recommendations of suitable ...
Johan Aberg
SIGUCCS
2000
ACM
14 years 26 days ago
From VTs to iMacs: Moving Public Computing Access into the 21st Century
In a Collegiate setting, technology must be functional, effective, and highly visible. In the fall of 1999 the CIS department at Bowdoin College saw the need for a greater number ...
Robert Denton, Patrick Jensen
AIPS
2003
13 years 10 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
TIT
2008
99views more  TIT 2008»
13 years 9 months ago
On the Connection-Level Stability of Congestion-Controlled Communication Networks
We are interested in the connection-level stability of a network employing congestion control. In particular, we study how the stability region of the network (i.e., the set of off...
Xiaojun Lin, Ness B. Shroff, R. Srikant