Sciweavers

13500 search results - page 2543 / 2700
» Improved analysis of D
Sort
View
SAC
2005
ACM
15 years 4 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
SIGECOM
2005
ACM
169views ECommerce» more  SIGECOM 2005»
15 years 4 months ago
Online auctions with re-usable goods
This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each a...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Mo...
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
15 years 4 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...
SIGMETRICS
2005
ACM
150views Hardware» more  SIGMETRICS 2005»
15 years 4 months ago
An analytical model for multi-tier internet services and its applications
- Since many Web applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a mode...
Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. S...
ATAL
2005
Springer
15 years 4 months ago
Extending the recognition-primed decision model to support human-agent collaboration
There has been much research investigating team cognition, naturalistic decision making, and collaborative technology as it relates to real world, complex domains of practice. How...
Xiaocong Fan, Shuang Sun, Michael D. McNeese, John...
« Prev « First page 2543 / 2700 Last » Next »