Sciweavers

334 search results - page 64 / 67
» How to Dynamically Merge Markov Decision Processes
Sort
View
CHI
2010
ACM
15 years 4 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong
SACMAT
2003
ACM
15 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ICPADS
2010
IEEE
14 years 7 months ago
Data-Aware Task Scheduling on Multi-accelerator Based Platforms
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
Cédric Augonnet, Jérôme Clet-O...
IPCCC
2007
IEEE
15 years 3 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
TCOM
2011
130views more  TCOM 2011»
14 years 4 months ago
Indirect Reciprocity Game Modelling for Cooperation Stimulation in Cognitive Networks
—In cognitive networks, since nodes generally belong to different authorities and pursue different goals, they will not cooperate with others unless cooperation can improve their...
Yan Chen, K. J. Ray Liu