Sciweavers

229 search results - page 31 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
CCS
2007
ACM
14 years 1 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
ELPUB
2000
ACM
14 years 2 days ago
Multimedia Cd-Rom as a Medium for Manuscript Preservation and Dissemination: The Design and Development of "Treasures of Islam"
The paper discusses the use of electronic publishing for the preservation and dissemination of rare manuscript material. It is based both upon the authors’ earlier work on multi...
Andrew Large, Jamshid Beheshti, Haidar Moukdad
GECCO
2006
Springer
164views Optimization» more  GECCO 2006»
13 years 11 months ago
Biobjective evolutionary and heuristic algorithms for intersection of geometric graphs
Wire routing in a VLSI chip often requires minimization of wire-length as well as the number of intersections among multiple nets. Such an optimization problem is computationally ...
Rajeev Kumar, Pramod Kumar Singh, Bhargab B. Bhatt...
INFOCOM
2010
IEEE
13 years 6 months ago
Resource Allocation over Network Dynamics without Timescale Separation
—We consider a widely applicable model of resource allocation where two sequences of events are coupled: on a continuous time axis (t), network dynamics evolve over time. On a di...
Alexandre Proutiere, Yung Yi, Tian Lan, Mung Chian...
CIKM
2009
Springer
14 years 10 days ago
Space-economical partial gram indices for exact substring matching
Exact substring matching queries on large data collections can be answered using q-gram indices, that store for each occurring q-byte pattern an (ordered) posting list with the po...
Nan Tang, Lefteris Sidirourgos, Peter A. Boncz