Sciweavers

6434 search results - page 1085 / 1287
» Model Transformations with Reference Models
Sort
View
123
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
107
Voted
INFORMATICALT
2010
66views more  INFORMATICALT 2010»
15 years 1 months ago
Forward Adaptation of Novel Semilogarithmic Quantizer and Lossless Coder for Speech Signals Compression
In this paper new semilogarithmic quantizer for Laplacian distribution is presented. It is simpler than classic A-law semilogarithmic quantizer since it has unit gain around zero. ...
Zoran H. Peric, Milan S. Savic, Milan R. Dincic, D...
95
Voted
JOCN
2010
60views more  JOCN 2010»
15 years 1 months ago
Responding with Restraint: What Are the Neurocognitive Mechanisms?
■ An important aspect of cognitive control is the ability to respond with restraint. Here, we modeled this experimentally by measuring the degree of response slowing that occurs...
Sara Jahfari, Cathy M. Stinear, Mike Claffey, Fred...
118
Voted
PVLDB
2010
129views more  PVLDB 2010»
15 years 1 months ago
Entity Resolution with Evolving Rules
Entity resolution (ER) identifies database records that refer to the same real world entity. In practice, ER is not a one-time process, but is constantly improved as the data, sc...
Steven Whang, Hector Garcia-Molina
109
Voted
QUESTA
2010
107views more  QUESTA 2010»
15 years 1 months ago
On the inapproximability of M/G/K: why two moments of job size distribution are not enough
The M/G/K queueing system is one of the oldest model for multi-server systems, and has been the topic of performance papers for almost half a century. However, even now, only coar...
Varun Gupta, Mor Harchol-Balter, J. G. Dai, Bert Z...
« Prev « First page 1085 / 1287 Last » Next »