Sciweavers

1450 search results - page 156 / 290
» On the Complexity of Hardness Amplification
Sort
View
CSFW
2006
IEEE
14 years 3 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
ICAC
2006
IEEE
14 years 3 months ago
Discovering Likely Invariants of Distributed Transaction Systems for Autonomic System Management
Large amount of monitoring data can be collected from distributed systems as the observables to analyze system behaviors. However, without reasonable models to characterize systems...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira
ISBI
2006
IEEE
14 years 3 months ago
Using multiple tensor deflection to reconstruct white matter fiber traces with branching
The relationship between brain structure and complex behavior is governed by large-scale neurocognitive networks. Diffusion weighted imaging(DWI) is a noninvasive technique that c...
Weihong Guo, Qingguo Zeng, Yunmei Chen, Yijun Liu
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
14 years 3 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...
RTCSA
2006
IEEE
14 years 3 months ago
Computing the Minimum EDF Feasible Deadline in Periodic Systems
In most real-time applications, deadlines are artifices that need to be enforced to meet different performance requirements. For example, in periodic task sets, jitter requiremen...
Hoai Hoang, Giorgio C. Buttazzo, Magnus Jonsson, S...