Sciweavers

5964 search results - page 1149 / 1193
» A theory of speculative computation
Sort
View
102
Voted
SIGMETRICS
2010
ACM
173views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Channel fragmentation in dynamic spectrum access systems: a theoretical study
Dynamic Spectrum Access systems exploit temporarily available spectrum (‘white spaces’) and can spread transmissions over a number of non-contiguous sub-channels. Such methods...
Edward G. Coffman Jr., Philippe Robert, Florian Si...
SIGMOD
2010
ACM
173views Database» more  SIGMOD 2010»
15 years 5 months ago
PR-join: a non-blocking join achieving higher early result rate with statistical guarantees
Online aggregation is a promising solution to achieving fast early responses for interactive ad-hoc queries that compute aggregates on a large amount of data. Essential to the suc...
Shimin Chen, Phillip B. Gibbons, Suman Nath
107
Voted
GECCO
2010
Springer
155views Optimization» more  GECCO 2010»
15 years 5 months ago
Negative selection algorithms without generating detectors
Negative selection algorithms are immune-inspired classifiers that are trained on negative examples only. Classification is performed by generating detectors that match none of ...
Maciej Liskiewicz, Johannes Textor
SACMAT
2009
ACM
15 years 5 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
15 years 5 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi
« Prev « First page 1149 / 1193 Last » Next »