Sciweavers

4335 search results - page 723 / 867
» Ontology Engineering Relationally
Sort
View
ICS
2009
Tsinghua U.
14 years 5 months ago
Fast and scalable list ranking on the GPU
General purpose programming on the graphics processing units (GPGPU) has received a lot of attention in the parallel computing community as it promises to offer the highest perfo...
M. Suhail Rehman, Kishore Kothapalli, P. J. Naraya...
TACAS
2009
Springer
127views Algorithms» more  TACAS 2009»
14 years 5 months ago
From Tests to Proofs
We describe the design and implementation of an automatic invariant generator for imperative programs. While automatic invariant generation through constraint solving has been exte...
Ashutosh Gupta, Rupak Majumdar, Andrey Rybalchenko
CSE
2009
IEEE
14 years 5 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
CSE
2009
IEEE
14 years 5 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
CSE
2009
IEEE
14 years 5 months ago
Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs
Abstract—Gold farming refers to the illicit practice of gathering and selling virtual goods in online games for real money. Although around one million gold farmers engage in gol...
Muhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Sr...