Sciweavers

630 search results - page 51 / 126
» Acceptable internet use policy
Sort
View
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
15 years 6 months ago
GAINS: genetic algorithms for increasing net sales of a mobile reverse demand communication system
In this paper, I describe MRDCOM, a mobile reverse-demand communication system for the pizza industry. The web-based system will support student (buyer) sign-up and will be capabl...
Michael Henry Wolk
JSAC
2011
123views more  JSAC 2011»
14 years 2 months ago
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
—The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems...
Srinivas Shakkottai, R. Srikant, Lei Ying
VLDB
2004
ACM
113views Database» more  VLDB 2004»
15 years 5 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
IPPS
1998
IEEE
15 years 4 months ago
An Efficient RMS Admission Control and Its Application to Multiprocessor Scheduling
A real-time system must execute functionally correct computations in a timely manner. In order to guarantee that all tasks accepted in the system will meet their timing requiremen...
Sylvain Lauzac, Rami G. Melhem, Daniel Mossé...
ESWS
2007
Springer
15 years 6 months ago
Simple Algorithms for Predicate Suggestions Using Similarity and Co-occurrence
Abstract When creating Semantic Web data, users have to make a critical choice for a vocabulary: only through shared vocabularies can meaning be established. A centralised policy p...
Eyal Oren, Sebastian Gerke, Stefan Decker