Sciweavers

1481 search results - page 132 / 297
» Software controlled power management
Sort
View
SAC
2005
ACM
15 years 10 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
PEPM
2011
ACM
14 years 7 months ago
Ordering multiple continuations on the stack
Passing multiple continuation arguments to a function in CPS form allows one to encode a wide variety of direct-style control constructs, such as conditionals, exceptions, and mul...
Dimitrios Vardoulakis, Olin Shivers
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 6 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
15 years 9 months ago
Spintronic memristor devices and application
—Spintronic memristor devices based upon spin torque induced magnetization motion are presented and potential application examples are given. The structure and material of these ...
Xiaobin Wang, Yiran Chen
COLT
2006
Springer
15 years 8 months ago
Online Learning with Constraints
In this paper, we study a sequential decision making problem. The objective is to maximize the total reward while satisfying constraints, which are defined at every time step. The...
Shie Mannor, John N. Tsitsiklis