Sciweavers

3679 search results - page 724 / 736
» Answer set based design of knowledge systems
Sort
View
95
Voted
CHI
2008
ACM
16 years 2 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
PODS
2002
ACM
168views Database» more  PODS 2002»
16 years 2 months ago
Conjunctive Selection Conditions in Main Memory
We consider the fundamental operation of applying a conjunction of selection conditions to a set of records. With large main memories available cheaply, systems may choose to keep...
Kenneth A. Ross
INFOCOM
2009
IEEE
15 years 8 months ago
Minimizing Delay for Multicast-Streaming in Wireless Networks with Network Coding
—Network coding is a method that promises to achieve the min-cut capacity in multicasts. However, pushing towards this gain in throughput comes with two sacrifices. Delay suffer...
Wai-Leong Yeow, Anh Tuan Hoang, Chen-Khong Tham
123
Voted
EVOW
2007
Springer
15 years 8 months ago
Modeling the Shoot Apical Meristem in A. thaliana : Parameter Estimation for Spatial Pattern Formation
Understanding the self-regulatory mechanisms controlling the spatial and temporal structure of multicellular organisms represents one of the major challenges in molecular biology. ...
Tim Hohm, Eckart Zitzler
HIPEAC
2007
Springer
15 years 8 months ago
Fetch Gating Control Through Speculative Instruction Window Weighting
In a dynamic reordering superscalar processor, the front-end fetches instructions and places them in the issue queue. Instructions are then issued by the back-end execution core. T...
Hans Vandierendonck, André Seznec