Sciweavers

1818 search results - page 128 / 364
» How users use access control
Sort
View
114
Voted
ASPDAC
2007
ACM
144views Hardware» more  ASPDAC 2007»
15 years 6 months ago
Control-Flow Aware Communication and Conflict Analysis of Parallel Processes
In this paper, we present an approach for control-flow aware communication and conflict analysis of systems of parallel communicating processes. This approach allows to determine ...
Axel Siebenborn, Alexander Viehl, Oliver Bringmann...
110
Voted
BCSHCI
2009
15 years 3 months ago
An evaluation of a meal planning system: ease of use and perceived usefulness
Unhealthy eating is an increasingly important problem in the western society. Our approach to this problem is to provide a meal planning system giving recommendations of suitable ...
Johan Aberg
SIGUCCS
2000
ACM
15 years 6 months ago
From VTs to iMacs: Moving Public Computing Access into the 21st Century
In a Collegiate setting, technology must be functional, effective, and highly visible. In the fall of 1999 the CIS department at Bowdoin College saw the need for a greater number ...
Robert Denton, Patrick Jensen
134
Voted
AIPS
2003
15 years 4 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
133
Voted
TIT
2008
99views more  TIT 2008»
15 years 2 months ago
On the Connection-Level Stability of Congestion-Controlled Communication Networks
We are interested in the connection-level stability of a network employing congestion control. In particular, we study how the stability region of the network (i.e., the set of off...
Xiaojun Lin, Ness B. Shroff, R. Srikant