Sciweavers

354 search results - page 53 / 71
» Key management for content access control in a hierarchy
Sort
View
MANSCI
2007
86views more  MANSCI 2007»
14 years 9 months ago
Proper Conditioning for Coherent VaR in Portfolio Management
Value at Risk (VaR) is a central concept in risk management. As stressed by Artzner et al. (1999), VaR may not possess the subadditivity property required to be a coherent measure...
René Garcia, Éric Renault, Georges T...
GECCO
2010
Springer
170views Optimization» more  GECCO 2010»
15 years 2 months ago
Improving reliability of embedded systems through dynamic memory manager optimization using grammatical evolution
Technology scaling has offered advantages to embedded systems, such as increased performance, more available memory and reduced energy consumption. However, scaling also brings a...
José Manuel Colmenar, José L. Risco-...
78
Voted
IIR
2010
14 years 8 months ago
Social Approach to Context-Aware Retrieval
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
Luca Vassena
ITICSE
1997
ACM
15 years 1 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom
CODES
2003
IEEE
15 years 2 months ago
A low-cost memory architecture with NAND XIP for mobile embedded systems
NAND flash memory has become an indispensable component in mobile embedded systems because of its versatile features such as non-volatility, solid-state reliability, low cost and ...
Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, ...