Sciweavers

1320 search results - page 210 / 264
» Performance Comparison of Distributed Object Server Implemen...
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ACSC
2004
IEEE
14 years 11 days ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
IHI
2010
198views Healthcare» more  IHI 2010»
13 years 3 months ago
Large-scale multimodal mining for healthcare with mapreduce
Recent advances in healthcare and bioscience technologies and proliferation of portable medical devices are producing massive amounts of multimodal data. The need for parallel pro...
Fei Wang, Vuk Ercegovac, Tanveer Fathima Syeda-Mah...
ESSLLI
2009
Springer
13 years 6 months ago
A Salience-Driven Approach to Speech Recognition for Human-Robot Interaction
We present an implemented model for speech recognition in natural environments which relies on contextual information about salient entities to prime utterance recognition. The hyp...
Pierre Lison
IMC
2004
ACM
14 years 2 months ago
On the responsiveness of DNS-based network control
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balacha...