Sciweavers

6303 search results - page 1138 / 1261
» A Generated Management for Distributed Systems
Sort
View
103
Voted
CCS
2009
ACM
16 years 1 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
139
Voted
IPPS
2010
IEEE
14 years 10 months ago
Structuring the execution of OpenMP applications for multicore architectures
Abstract--The now commonplace multi-core chips have introduced, by design, a deep hierarchy of memory and cache banks within parallel computers as a tradeoff between the user frien...
François Broquedis, Olivier Aumage, Brice G...
CVPR
2001
IEEE
16 years 2 months ago
Clustering Art
We extend a recently developed method [1] for learning the semantics of image databases using text and pictures. We incorporate statistical natural language processing in order to...
Kobus Barnard, Pinar Duygulu, David A. Forsyth
123
Voted
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 1 months ago
Probabilistic author-topic models for information discovery
We propose a new unsupervised learning technique for extracting information from large text collections. We model documents as if they were generated by a two-stage stochastic pro...
Mark Steyvers, Padhraic Smyth, Michal Rosen-Zvi, T...
113
Voted
MOBIHOC
2008
ACM
16 years 10 days ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
« Prev « First page 1138 / 1261 Last » Next »