Sciweavers

4072 search results - page 771 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
CCS
2011
ACM
13 years 11 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
DAC
2004
ACM
16 years 4 days ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
ESAW
2004
Springer
15 years 4 months ago
Techniques for Analysis and Calibration of Multi-agent Simulations
In this paper we present analysis and calibration techniques that exploit knowledge about a multi agent society in order to calibrate the system parameters of a corresponding socie...
Manuel Fehler, Franziska Klügl, Frank Puppe
BMCBI
2004
88views more  BMCBI 2004»
14 years 11 months ago
Coronavirus 3CLpro proteinase cleavage sites: Possible relevance to SARS virus pathology
Background: Despite the passing of more than a year since the first outbreak of Severe Acute Respiratory Syndrome (SARS), efficient counter-measures are still few and many believe...
Lars Kiemer, Ole Lund, Søren Brunak, Nikola...
SIGSOFT
1995
ACM
15 years 2 months ago
An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development
—We conducted a long-term experiment to compare the costs and benefits of several different software inspection methods. These methods were applied by professional developers to ...
Adam A. Porter, Harvey P. Siy, Carol A. Toman, Law...