Sciweavers

427 search results - page 64 / 86
» Policies: Giving Users Control over Calls
Sort
View
JUCS
2008
129views more  JUCS 2008»
13 years 9 months ago
Easing the Smart Home: Semi-automatic Adaptation in Perceptive Environments
: This paper analyses the requirements of automation and adaptation in the so called perceptive environments. These environments are places with the ability of perceiving the conte...
Manuel García-Herranz, Pablo A. Haya, Abrah...
EDBT
2009
ACM
117views Database» more  EDBT 2009»
14 years 1 months ago
Parsimonious temporal aggregation
Temporal aggregation is a crucial operator in temporal databases and has been studied in various flavors. In instant temporal aggregation (ITA) the aggregate value at time instan...
Juozas Gordevicius, Johann Gamper, Michael H. B&ou...
JMLR
2010
135views more  JMLR 2010»
13 years 4 months ago
An Exponential Model for Infinite Rankings
This paper presents a statistical model for expressing preferences through rankings, when the number of alternatives (items to rank) is large. A human ranker will then typically r...
Marina Meila, Le Bao
SACMAT
2009
ACM
14 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ICSE
2004
IEEE-ACM
14 years 10 months ago
Skoll: Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Atif M. Memon, Adam A. Porter, Cemal Yilmaz, Adith...