Sciweavers

131 search results - page 19 / 27
» Incorporating Trust in Network Virtualization
Sort
View
ICDM
2010
IEEE
186views Data Mining» more  ICDM 2010»
14 years 7 months ago
MoodCast: Emotion Prediction via Dynamic Continuous Factor Graph Model
Human emotion is one important underlying force affecting and affected by the dynamics of social networks. An interesting question is "can we predict a person's mood base...
Yuan Zhang, Jie Tang, Jimeng Sun, Yiran Chen, Jing...
ACSAC
2005
IEEE
15 years 3 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
ASPDAC
2008
ACM
104views Hardware» more  ASPDAC 2008»
14 years 11 months ago
Low power clock buffer planning methodology in F-D placement for large scale circuit design
Traditionally, clock network layout is performed after cell placement. Such methodology is facing a serious problem in nanometer IC designs where people tend to use huge clock buff...
Yanfeng Wang, Qiang Zhou, Yici Cai, Jiang Hu, Xian...
NEUROSCIENCE
2001
Springer
15 years 2 months ago
Modularity and Specialized Learning: Mapping between Agent Architectures and Brain Organization
This volume is intended to help advance the field of artificial neural networks along the lines of complexity present in animal brains. In particular, we are interested in examin...
Joanna Bryson, Lynn Andrea Stein
SIS
2004
14 years 11 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...