Sciweavers

14244 search results - page 2380 / 2849
» Modeling Program Predictability
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 11 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
TASE
2007
IEEE
15 years 11 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
CP
2007
Springer
15 years 11 months ago
: The Design and Analysis of an Algorithm Portfolio for SAT
It has been widely observed that there is no “dominant” SAT solver; instead, different solvers perform best on different instances. Rather than following the traditional appr...
Lin Xu, Frank Hutter, Holger H. Hoos, Kevin Leyton...
HUC
2007
Springer
15 years 11 months ago
Tracking Free-Weight Exercises
Weight training, in addition to aerobic exercises, is an important component of a balanced exercise program. However, mechanisms for tracking free weight exercises have not yet bee...
Keng-hao Chang, Mike Y. Chen, John Canny
SGAI
2007
Springer
15 years 11 months ago
Extending Jess to Handle Uncertainty
Computer scientists are often faced with the challenge of having to model the world and its associated uncertainties. One area in particular where modelling uncertainty is importa...
David Corsar, Derek H. Sleeman, Anne McKenzie
« Prev « First page 2380 / 2849 Last » Next »