Sciweavers

1627 search results - page 266 / 326
» On context in authorization policy
Sort
View
FUIN
2002
76views more  FUIN 2002»
13 years 8 months ago
Making revision reversible: an approach based on polynomials
This paper deals with iterated belief change and proposes a drastic revision rule that modifies a plausibility ordering of interpretations in such a way that any world where the in...
Salem Benferhat, Didier Dubois, Sylvain Lagrue, Od...
JNSM
1998
94views more  JNSM 1998»
13 years 8 months ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong
TCAD
2002
118views more  TCAD 2002»
13 years 8 months ago
Application-specific clustered VLIW datapaths: early exploration on a parameterized design space
Specialized clustered very large instruction word (VLIW) processors combined with effective compilation techniques enable aggressive exploitation of the high instruction-level para...
Viktor S. Lapinskii, Margarida F. Jacome, Gustavo ...
CHI
2010
ACM
13 years 7 months ago
"Who's scribing?": documenting patient encounter during trauma resuscitation
With healthcare moving towards electronic health records, it is important to understand existing work practices to design effective systems. We conducted an observational study in...
Aleksandra Sarcevic
VTC
2010
IEEE
130views Communications» more  VTC 2010»
13 years 7 months ago
Receiver Multiuser Diversity Aided Multi-Stage MMSE Multiuser Detection for DS-CDMA and SDMA Systems Employing I-Q Modulation
Abstract— The so-called receiver multiuser diversity aided multistage minimum mean-square error multiuser detector (RMD/MS-MMSE MUD), which was proposed previously by the author,...
Lie-Liang Yang