Sciweavers

457 search results - page 74 / 92
» Construction of a Highly Dependable Operating System
Sort
View
JUCS
2007
90views more  JUCS 2007»
14 years 9 months ago
Supporting the Authoring and Operationalization of Educational Modelling Languages
: The modelling of educational processes and their operational support is a key aspect in the construction of more effective e-learning applications. Instructional models are usual...
Iván Martínez-Ortiz, Pablo Moreno-Ge...
CCS
2011
ACM
13 years 9 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
MEDINFO
2007
132views Healthcare» more  MEDINFO 2007»
14 years 11 months ago
Comparing Decision Support Methodologies for Identifying Asthma Exacerbations
Objective: To apply and compare common machine learning techniques with an expert-built Bayesian Network to determine eligibility for asthma guidelines in pediatric emergency depa...
Judith W. Dexheimer, Laura E. Brown, Jeffrey Leego...
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
14 years 10 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
SACMAT
2006
ACM
15 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov