Sciweavers

2208 search results - page 157 / 442
» On Issues of Instance Selection
Sort
View
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
112
Voted
ICAIL
2007
ACM
15 years 7 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
FAST
2004
15 years 5 months ago
Buttress: A Toolkit for Flexible and High Fidelity I/O Benchmarking
In benchmarking I/O systems, it is important to generate, accurately, the I/O access pattern that one is intending to generate. However, timing accuracy ( issuing I/Os at the desi...
Eric Anderson, Mahesh Kallahalla, Mustafa Uysal, R...
133
Voted
ACL
1997
15 years 5 months ago
Ambiguity Resolution for Machine Translation of Telegraphic Messages
Telegraphic messages with numerous instances of omission pose a new challenge to parsing in that a sentence with omission causes a higher degree of ambi6uity than a sentence witho...
Young-Suk Lee, Clifford J. Weinstein, Stephanie Se...
131
Voted
WSC
1997
15 years 5 months ago
On the Effect and Control of Self-Similar Network Traffic: A Simulation Perspective
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...
Kihong Park