Sciweavers

5684 search results - page 956 / 1137
» Computing with active dendrites
Sort
View
ESORICS
2007
Springer
15 years 8 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
EUROMICRO
2009
IEEE
15 years 8 months ago
Fault-Tolerant BPEL Workflow Execution via Cloud-Aware Recovery Policies
BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications tha...
Ernst Juhnke, Tim Dörnemann, Bernd Freisleben
ATAL
2006
Springer
15 years 8 months ago
Toward an understanding of the impact of software personal assistants on human organizations
Intelligent software personal assistants for human organizations are an active research area within the multiagent community. However, while many capabilities for these software p...
Steven Okamoto, Paul Scerri, Katia P. Sycara
140
Voted
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
DSD
2004
IEEE
104views Hardware» more  DSD 2004»
15 years 8 months ago
A Static Low-Power, High-Performance 32-bit Carry Skip Adder
In this paper, we present a full-static carry-skip adder designed to achieve low power dissipation and high-performance operation. To reduce the adder's delay and power consu...
Kai Chirca, Michael J. Schulte, John Glossner, Hao...