Sciweavers

202 search results - page 13 / 41
» Managing Controlled Violation of Temporal Process Constraint...
Sort
View
61
Voted
ICASSP
2008
IEEE
15 years 5 months ago
Iterative R-D optimization of H.264
In this paper, we apply the primal-dual decomposition and subgradient projection methods to solve the rate-distortion optimization problem with the constant bit rate constraint. T...
Cheolhong An, Truong Q. Nguyen
EDOC
2011
IEEE
13 years 10 months ago
Resource and Agreement Management in Dynamic Crowdcomputing Environments
Abstract—Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowdsourcing environments tha...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
64
Voted
CORR
2002
Springer
104views Education» more  CORR 2002»
14 years 10 months ago
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
In order to control the process of data mining and focus on the things of interest to us, many kinds of constraints have been added into the algorithms of data mining. However, di...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
SIES
2009
IEEE
15 years 5 months ago
Programmable temporal isolation through variable-bandwidth servers
—We introduce variable-bandwidth servers (VBS) for scheduling and executing processes under programmable temporal isolation. A VBS is an extension of a constant-bandwidth server ...
Silviu S. Craciunas, Christoph M. Kirsch, Hannes P...
SACMAT
2003
ACM
15 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck