Sciweavers

324 search results - page 41 / 65
» Towards a type theory of contexts
Sort
View
CCS
2004
ACM
14 years 1 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
INFOCOM
2008
IEEE
14 years 2 months ago
On Survivable Access Network Design: Complexity and Algorithms
Abstract— We consider the computational complexity and algorithm challenges in designing survivable access networks. With limited routing capability, the structure of an access n...
Dahai Xu, Elliot Anshelevich, Mung Chiang
CONTEXT
2007
Springer
14 years 1 months ago
Thai Text Coherence Structuring with Coordinating and Subordinating Relations for Text Summarization
Text summarization with the consideration of coherence can be achieved by using discourse processing with the Rhetorical Structure Theory (RST). Additional problems on relational a...
Thana Sukvaree, Asanee Kawtrakul, Jean Caelen
SIGMETRICS
2003
ACM
131views Hardware» more  SIGMETRICS 2003»
14 years 1 months ago
Classifying scheduling policies with respect to unfairness in an M/GI/1
It is common to evaluate scheduling policies based on their mean response times. Another important, but sometimes opposing, performance metric is a scheduling policy’s fairness....
Adam Wierman, Mor Harchol-Balter
IFIP
2001
Springer
14 years 7 days ago
Systemic Functional Hypertexts (SFHT):
Abstract: On the background of rising Intranet applications the automatic generation of adaptable, context-sensitive hypertexts becomes more and more important [El-Beltagy et al., ...
Alexander Mehler, Rodney J. Clarke