Sciweavers

360 search results - page 65 / 72
» Remote Access of Computer Controlled Experiments
Sort
View
ICLP
2007
Springer
13 years 11 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
CCS
2008
ACM
13 years 9 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
AAAI
2000
13 years 9 months ago
Collective Intelligence and Braess' Paradox
We consider the use of multi-agent systems to control network routing. Conventional approaches to this task are based on Ideal Shortest Path routing Algorithm (ISPA), under which ...
Kagan Tumer, David Wolpert
MTA
2011
219views Hardware» more  MTA 2011»
13 years 2 months ago
Network-adaptive autonomic transcoding algorithm for seamless streaming media service of mobile clients
As a result of improvements in wireless communication technologies, a multimedia data streaming service can now be provided for mobile clients. Since mobile devices have low comput...
Dongmahn Seo, Inbum Jung
PEWASUN
2004
ACM
14 years 29 days ago
Multipath routing and multiple description coding in ad-hoc networks: a simulation study
The nature of ad hoc networks makes it a challenge to offer connections with an assured quality. In order to improve the performance of the network, multipath routing in combinati...
Irene Fernández Díaz, Dick H. J. Epe...