Sciweavers

1558 search results - page 228 / 312
» Scalable work stealing
Sort
View
CN
2007
111views more  CN 2007»
13 years 8 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
CSL
2007
Springer
13 years 8 months ago
Partially observable Markov decision processes for spoken dialog systems
In a spoken dialog system, determining which action a machine should take in a given situation is a difficult problem because automatic speech recognition is unreliable and hence ...
Jason D. Williams, Steve Young
JNW
2006
142views more  JNW 2006»
13 years 8 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
NETWORK
2008
106views more  NETWORK 2008»
13 years 8 months ago
An Effective QoS Differentiation Scheme for Wireless Mesh Networks
Wireless mesh networking is emerging as an important architecture for future-generation wireless communications systems. Quality of service provisioning is a challenging issue in ...
Honglin Hu, Yan Zhang, Hsiao-Hwa Chen
FTDB
2007
95views more  FTDB 2007»
13 years 8 months ago
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industr...
Joseph M. Hellerstein, Michael Stonebraker, James ...