Sciweavers

1147 search results - page 63 / 230
» Transformation of Access Rights
Sort
View
ORL
2007
50views more  ORL 2007»
15 years 4 months ago
NP-Hardness of checking the unichain condition in average cost MDPs
The unichain condition requires that every policy in an MDP result in a single ergodic class, and guarantees that the optimal average cost is independent of the initial state. We ...
John N. Tsitsiklis
127
Voted
SRDS
2003
IEEE
15 years 10 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
ANSS
2006
IEEE
15 years 11 months ago
A Simulation and Decision Framework for Selection of Numerical Solvers in
Selecting the right numerical solver or the most appropriate numerical package for a particular simulation problem it is increasingly difficult for users without an extensive math...
Peter Bunus
SIGGRAPH
1992
ACM
15 years 9 months ago
PixelFlow: high-speed rendering using image composition
We describe PixelFlow, an architecture for high-speed image generation that overcomes the transformation- and frame-buffer
Steven Molnar, John G. Eyles, John Poulton
144
Voted
CLUSTER
2004
IEEE
15 years 8 months ago
Predicting memory-access cost based on data-access patterns
Improving memory performance at software level is more effective in reducing the rapidly expanding gap between processor and memory performance. Loop transformations (e.g. loop un...
Surendra Byna, Xian-He Sun, William Gropp, Rajeev ...