Sciweavers

4839 search results - page 77 / 968
» A survey of computational complexity results in systems and ...
Sort
View
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 7 months ago
Reducing the space-time complexity of the CMA-ES
A limited memory version of the covariance matrix adaptation evolution strategy (CMA-ES) is presented. This algorithm, L-CMA-ES, improves the space and time complexity of the CMA-...
James N. Knight, Monte Lunacek
EUC
2005
Springer
15 years 7 months ago
Access Policy Sheet for Access Control in Fine-Grained XML
Abstract. We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify t...
Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
AINA
2007
IEEE
15 years 8 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
HICSS
2005
IEEE
165views Biometrics» more  HICSS 2005»
15 years 7 months ago
A Study of Project Management System Acceptance
This study surveyed 497 project management software users in a wide variety of project-driven organizations to examine the relationships among: computer self-efficacy, information...
Abdullah Saeed Bani Ali, William H. Money
CHI
2011
ACM
14 years 5 months ago
Opportunities for computing technologies to support healthy sleep behaviors
Getting the right amount of quality sleep is a key aspect of good health, along with a healthy diet and regular exercise. Human-computer interaction (HCI) researchers have recentl...
Eun Kyoung Choe, Sunny Consolvo, Nathaniel F. Wats...