Sciweavers

1167 search results - page 129 / 234
» policy 2007
Sort
View
148
Voted
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 4 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
CIDR
2007
116views Algorithms» more  CIDR 2007»
15 years 6 months ago
Managing Query Compilation Memory Consumption to Improve DBMS Throughput
While there are known performance trade-offs between database page buffer pool and query execution memory allocation policies, little has been written on the impact of query compi...
Boris Baryshnikov, Cipri Clinciu, Conor Cunningham...
120
Voted
CIDR
2007
79views Algorithms» more  CIDR 2007»
15 years 6 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
121
Voted
HCI
2007
15 years 6 months ago
Inhabitant Guidance of Smart Environments
Abstract. With the convergence of technologies in artificial intelligence, humancomputer interfaces, and pervasive computing, the idea of a “smart environment” is becoming a re...
Parisa Rashidi, G. Michael Youngblood, Diane J. Co...
ICONIP
2007
15 years 6 months ago
Finding Exploratory Rewards by Embodied Evolution and Constrained Reinforcement Learning in the Cyber Rodents
The aim of the Cyber Rodent project [1] is to elucidate the origin of our reward and affective systems by building artificial agents that share the natural biological constraints...
Eiji Uchibe, Kenji Doya