Sciweavers

140 search results - page 21 / 28
» Configuration Theories
Sort
View
AUTONOMICS
2008
ACM
15 years 3 days ago
On modeling of self-organizing systems
A goal of computing and networking systems is to limit administrative requirements for users and operators. A technical systems should be able to configure itself as much as possi...
Richard Holzer, Hermann de Meer
CCS
2008
ACM
15 years 3 days ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
IIWAS
2008
14 years 11 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
DAGSTUHL
2000
14 years 11 months ago
Similarity Measure Computation of Convex Polyhedra Revisited
We study the computation of rotation-invariant similarity measures of convex polyhedra, based on Minkowski's theory of mixed volumes. To compute the similarity measure, a (mix...
Jos B. T. M. Roerdink, Henk Bekker
ISMB
1993
14 years 11 months ago
Protein Sequencing Experiment Planning Using Analogy
Experiment design and execution is a central activity in the natural sciences. The SeqERsystem provides a general architecture for the integration of automated planning techniques...
Brian P. Kettler, Lindley Darden