Sciweavers

9405 search results - page 311 / 1881
» Computing a Model of Set Theory
Sort
View
WWW
2008
ACM
16 years 5 months ago
Optimal marketing strategies over social networks
We discuss the use of social networks in implementing viral marketing strategies. While influence maximization has been studied in this context (see Chapter 24 of [10]), we study ...
Jason D. Hartline, Vahab S. Mirrokni, Mukund Sunda...
SAC
2010
ACM
15 years 11 months ago
Implementing software product lines using traits
A software product line (SPL) is a set of software systems with well-defined commonalities and variabilities that are developed by managed reuse of common artifacts. In this pape...
Lorenzo Bettini, Ferruccio Damiani, Ina Schaefer
139
Voted
GCC
2005
Springer
15 years 10 months ago
The Computation of Semantic Data Cube
The multidimensional analysis based on data cube has been growing interest. However existing data cube model usually does not have the semantics of attributes and hence the analysi...
Yubao Liu, Jian Yin
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 8 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
ASAP
2006
IEEE
145views Hardware» more  ASAP 2006»
15 years 11 months ago
2D-VLIW: An Architecture Based on the Geometry of Computation
This work proposes a new architecture and execution model called 2D-VLIW. This architecture adopts an execution model based on large pieces of computation running over a matrix of...
Ricardo Santos, Rodolfo Azevedo, Guido Araujo