Sciweavers

914 search results - page 67 / 183
» Effective vaccination policies
Sort
View
118
Voted
CORR
2010
Springer
174views Education» more  CORR 2010»
14 years 10 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
GLOBECOM
2007
IEEE
15 years 7 months ago
Analyzing Performance of Multi-User Scheduling Jointly with AMC and ARQ
—This paper deals with the analytical evaluation of the average delay, the packet-loss rate (PLR) and the throughput of a multi-user (MU) wireless system that capitalizes on a cr...
Mario Poggioni, Luca Rugini, Paolo Banelli
IJKESDP
2010
94views more  IJKESDP 2010»
14 years 9 months ago
Rule acquisition for cognitive agents by using estimation of distribution algorithms
Cognitive Agents must be able to decide their actions based on their recognized states. In general, learning mechanisms are equipped for such agents in order to realize intellgent ...
Tokue Nishimura, Hisashi Handa
VLDB
2006
ACM
172views Database» more  VLDB 2006»
16 years 24 days ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
124
Voted
PERCOM
2006
ACM
16 years 5 days ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...