Sciweavers

2111 search results - page 93 / 423
» How to Program Pervasive Systems
Sort
View
DEON
2008
Springer
15 years 2 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
113
Voted
ANOR
2007
180views more  ANOR 2007»
15 years 22 days ago
Ethics in OR/MS: past, present and future
Abstract The pervasiveness and impact on society and on every day human life of technology has led to a growing awareness that science and technology cannot be considered above or ...
Jean-Pierre Brans, Giorgio Gallo
88
Voted
HOTOS
1999
IEEE
15 years 5 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
ICDE
2012
IEEE
205views Database» more  ICDE 2012»
13 years 3 months ago
Optimizing Statistical Information Extraction Programs over Evolving Text
—Statistical information extraction (IE) programs are increasingly used to build real-world IE systems such as Alibaba, CiteSeer, Kylin, and YAGO. Current statistical IE approach...
Fei Chen, Xixuan Feng, Christopher Re, Min Wang
117
Voted
PDPTA
2003
15 years 2 months ago
An Interactive Tuning Support for Processor Allocation of Data-Driven Realtime Programs
This paper presents the effectiveness of an interactive support facility to tune processor allocation of data-driven realtime programs on CUE (Coordinating Users’ requirements an...
Yasuhiro Wabiko, Hiroaki Nishikawa