Sciweavers

17541 search results - page 3392 / 3509
» Complexity in scalable computing
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
SIGDOC
2009
ACM
15 years 4 months ago
Facilita: reading assistance for low-literacy readers
Texts are the media content primarily available on Web sites and applications. However, this heavy use of texts creates an accessibility barrier to those who cannot read fluently...
Willian Massami Watanabe, Arnaldo Candido Junior, ...
SIGIR
2009
ACM
15 years 4 months ago
Learning to recommend with social trust ensemble
As an indispensable technique in the field of Information Filtering, Recommender System has been well studied and developed both in academia and in industry recently. However, mo...
Hao Ma, Irwin King, Michael R. Lyu
ASPLOS
2010
ACM
15 years 4 months ago
A real system evaluation of hardware atomicity for software speculation
In this paper we evaluate the atomic region compiler abstraction by incorporating it into a commercial system. We find that atomic regions are simple and intuitive to integrate i...
Naveen Neelakantam, David R. Ditzel, Craig B. Zill...
FDL
2008
IEEE
15 years 4 months ago
Contradiction Analysis for Constraint-based Random Simulation
Constraint-based random simulation is state-of-the-art in verification of multi-million gate industrial designs. This method is based on stimulus generation by constraint solving...
Daniel Große, Robert Wille, Robert Siegmund,...
« Prev « First page 3392 / 3509 Last » Next »