Sciweavers

2250 search results - page 176 / 450
» Authorizing applications in singularity
Sort
View
DAC
2004
ACM
15 years 3 months ago
Hierarchical approach to exact symbolic analysis of large analog circuits
—This paper proposes a novel approach to the exact symbolic analysis of very large analog circuits. The new method is based on determinant decision diagrams (DDDs) representing s...
Sheldon X.-D. Tan, Weikun Guo, Zhenyu Qi
70
Voted
IUI
2004
ACM
15 years 3 months ago
Making critiquing practical: incremental development of educational critiquing systems
Expert critiquing systems in education can support teachers in providing high quality individualized feedback to students. These systems, however, require significant development ...
Lin Qiu, Christopher Riesbeck
SACMAT
2004
ACM
15 years 3 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
VAST
2004
ACM
15 years 3 months ago
A case study of a virtual audience in a reconstruction of an ancient Roman odeon in Aphrodisias
The benefits of including virtual humans into cultural heritage reconstructions are twofold: the realism of architectural models is increased by populating them; and, as well, it...
Pablo de Heras Ciechomski, Branislav Ulicny, Rache...
MIDDLEWARE
2004
Springer
15 years 3 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov