Sciweavers

1147 search results - page 63 / 230
» Transformation of Access Rights
Sort
View
ORL
2007
50views more  ORL 2007»
13 years 8 months ago
NP-Hardness of checking the unichain condition in average cost MDPs
The unichain condition requires that every policy in an MDP result in a single ergodic class, and guarantees that the optimal average cost is independent of the initial state. We ...
John N. Tsitsiklis
SRDS
2003
IEEE
14 years 2 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
ANSS
2006
IEEE
14 years 2 months ago
A Simulation and Decision Framework for Selection of Numerical Solvers in
Selecting the right numerical solver or the most appropriate numerical package for a particular simulation problem it is increasingly difficult for users without an extensive math...
Peter Bunus
SIGGRAPH
1992
ACM
14 years 24 days ago
PixelFlow: high-speed rendering using image composition
We describe PixelFlow, an architecture for high-speed image generation that overcomes the transformation- and frame-buffer
Steven Molnar, John G. Eyles, John Poulton
CLUSTER
2004
IEEE
14 years 14 days ago
Predicting memory-access cost based on data-access patterns
Improving memory performance at software level is more effective in reducing the rapidly expanding gap between processor and memory performance. Loop transformations (e.g. loop un...
Surendra Byna, Xian-He Sun, William Gropp, Rajeev ...