Sciweavers

1783 search results - page 165 / 357
» Provenance and Data Synchronization
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
AGP
1998
IEEE
15 years 8 months ago
The Correctness of Set-Sharing
It is important that practical data flow analysers are backed bly proven theoretical results. Abstract interpretation provides a sound mathematical framework and necessary generic ...
Patricia M. Hill, Roberto Bagnara, Enea Zaffanella
HPCA
1995
IEEE
15 years 8 months ago
Implementation of Atomic Primitives on Distributed Shared Memory Multiprocessors
In this paper we consider several hardware implementations of the general-purpose atomic primitives fetch and Φ, compare and swap, load linked, and store conditionalon large-scal...
Maged M. Michael, Michael L. Scott
AIED
2009
Springer
15 years 7 months ago
Modeling Helping Behavior in an Intelligent Tutor for Peer Tutoring
Giving effective help is an important collaborative skill that leads to improved learning for both the help-giver and help-receiver. Adding intelligent tutoring to student interact...
Erin Walker, Nikol Rummel, Kenneth R. Koedinger
FLAIRS
2008
15 years 6 months ago
A Mixture Imputation-Boosted Collaborative Filter
Recommendation systems suggest products to users. Collaborative filtering (CF) systems, which base those recommendations on a database of previous ratings by various users and pro...
Xiaoyuan Su, Taghi M. Khoshgoftaar, Russell Greine...