Sciweavers

2372 search results - page 367 / 475
» Probabilistic calling context
Sort
View
CSFW
2004
IEEE
13 years 11 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
BROADNETS
2006
IEEE
13 years 11 months ago
On Traffic Grooming Choices for IP over WDM networks
Traffic grooming continues to be a rich area of research in the context of WDM optical networks. We provide an overview of the optical and electronic grooming techniques available...
Srivatsan Balasubramanian, Arun K. Somani
DNA
2006
Springer
13 years 11 months ago
Design and Simulation of Self-repairing DNA Lattices
Self-repair is essential to all living systems, providing the ability to remain functional in spite of gradual damage. In the context of self-assembly of self-repairing synthetic b...
Urmi Majumder, Sudheer Sahu, Thomas H. LaBean, Joh...
E4MAS
2006
Springer
13 years 11 months ago
Spatially Distributed Normative Infrastructure
Abstract. In previous works we have presented a model to describe and simulate environment for situated multi-agent systems, that we called ELMS. Here, we present an extensions to ...
Fabio Y. Okuyama, Rafael H. Bordini, Antônio...
EMO
2006
Springer
170views Optimization» more  EMO 2006»
13 years 11 months ago
Robust Multi-Objective Optimization in High Dimensional Spaces
1 In most real world optimization problems several optimization goals have to be considered in parallel. For this reason, there has been a growing interest in Multi-Objective Optim...
André Sülflow, Nicole Drechsler, Rolf ...