Sciweavers

10 search results - page 2 / 2
» Online association policies in IEEE 802.11 WLANs
Sort
View
SASO
2008
IEEE
13 years 12 months ago
Leveraging Organizational Guidance Policies with Learning to Self-Tune Multiagent Systems
As organization-based multiagent systems are applied to more complex problems, configuring and tuning the systems can become nearly as complex as the original problem a system wa...
Scott J. Harmon, Scott A. DeLoach, Robby, Doina Ca...
HPCA
2000
IEEE
13 years 10 months ago
Modified LRU Policies for Improving Second-Level Cache Behavior
Main memory accesses continue to be a significant bottleneck for applications whose working sets do not fit in second-level caches. With the trend of greater associativity in seco...
Wayne A. Wong, Jean-Loup Baer
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 5 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
13 years 12 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
CSE
2009
IEEE
14 years 11 days ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...