Sciweavers

1990 search results - page 303 / 398
» Optimizing the Instruction Cache Performance of the Operatin...
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ICDE
2010
IEEE
221views Database» more  ICDE 2010»
13 years 9 months ago
A generic auto-provisioning framework for cloud databases
— We discuss the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, we descr...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
GECCO
2005
Springer
130views Optimization» more  GECCO 2005»
14 years 2 months ago
Hybrid real-coded mutation for genetic algorithms applied to graph layouts
In this paper we introduce an application of real-coded genetic algorithms to the problem of consistent graph layout and exploring the role of mutation for this particular problem...
Dana Vrajitoru, Jason DeBoni
ICRA
2009
IEEE
148views Robotics» more  ICRA 2009»
13 years 6 months ago
Dynamic path planning with multi-agent data fusion - The Parallel Hierarchical Replanner
The design of a hierarchical planning system in which each level operates in parallel and communicates asynchronously is presented. It is shown that this Parallel Hierarchical Repl...
Thomas Allen, Andrew Hill, James Patrick Underwood...
PODS
2002
ACM
168views Database» more  PODS 2002»
14 years 9 months ago
Conjunctive Selection Conditions in Main Memory
We consider the fundamental operation of applying a conjunction of selection conditions to a set of records. With large main memories available cheaply, systems may choose to keep...
Kenneth A. Ross