Sciweavers

1259 search results - page 51 / 252
» On Survivable Access Network Design: Complexity and Algorith...
Sort
View
ICALP
2010
Springer
15 years 9 months ago
Network Design via Core Detouring for Problems without a Core
Some of the currently best-known approximation algorithms for network design are based on random sampling. One of the key steps of such algorithms is connecting a set of source nod...
Fabrizio Grandoni, Thomas Rothvoß
POLICY
2004
Springer
15 years 9 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
INFORMATICALT
2007
123views more  INFORMATICALT 2007»
15 years 4 months ago
Design and Implementation of Parallel Counterpropagation Networks Using MPI
The objective of this research is to construct parallel models that simulate the behavior of artificial neural networks. The type of network that is simulated in this project is t...
Athanasios Margaris, Stavros Souravlas, Efthimios ...
WWW
2009
ACM
16 years 5 months ago
sMash: semantic-based mashup navigation for data API network
With the proliferation of data APIs, it is not uncommon that users who have no clear ideas about data APIs will encounter difficulties to build Mashups to satisfy their requiremen...
Bin Lu, Zhaohui Wu, Yuan Ni, Guo Tong Xie, Chunyin...
INFOCOM
2002
IEEE
15 years 9 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...