Sciweavers

715 search results - page 141 / 143
» Integration of Access Control in Information Systems: From R...
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
ENTCS
2007
168views more  ENTCS 2007»
13 years 8 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
BMCBI
2008
125views more  BMCBI 2008»
13 years 8 months ago
Exploration and visualization of gene expression with neuroanatomy in the adult mouse brain
Background: Spatially mapped large scale gene expression databases enable quantitative comparison of data measurements across genes, anatomy, and phenotype. In most ongoing effort...
Christopher Lau, Lydia Ng, Carol Thompson, Sayan D...
INFOCOM
2010
IEEE
13 years 6 months ago
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
—Online advertising is a rapidly growing industry currently dominated by the search engine ’giant’ Google. In an attempt to tap into this huge market, Internet Service Provid...
Gabriel Maciá-Fernández, Yong Wang, ...
PPOPP
2010
ACM
14 years 3 months ago
An adaptive performance modeling tool for GPU architectures
This paper presents an analytical model to predict the performance of general-purpose applications on a GPU architecture. The model is designed to provide performance information ...
Sara S. Baghsorkhi, Matthieu Delahaye, Sanjay J. P...