Sciweavers

3074 search results - page 614 / 615
» Is structural underdetermination possible
Sort
View
144
Voted
CCS
2011
ACM
14 years 3 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
HIPEAC
2011
Springer
14 years 2 months ago
NoC-aware cache design for multithreaded execution on tiled chip multiprocessors
In chip multiprocessors (CMPs), data accesslatency dependson the memory hierarchy organization, the on-chip interconnect (NoC), and the running workload. Reducing data access late...
Ahmed Abousamra, Alex K. Jones, Rami G. Melhem
ASPLOS
2012
ACM
13 years 11 months ago
A case for unlimited watchpoints
Numerous tools have been proposed to help developers fix software errors and inefficiencies. Widely-used techniques such as memory checking suffer from overheads that limit thei...
Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd ...
IHI
2012
291views Healthcare» more  IHI 2012»
13 years 11 months ago
PANI: an interactive data-driven tool for target prioritization in signaling networks
Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
KI
2012
Springer
13 years 11 months ago
Agreeing on Role Adoption in Open Organisations
The organisational specification of a multi-agent system supports agents’ effectiveness in attaining their purpose, or prevent certain undesired behaviour from occurring. This r...
Huib Aldewereld, Virginia Dignum, Catholijn M. Jon...