Sciweavers

4955 search results - page 786 / 991
» Multiple Pattern Databases
Sort
View
ACSAC
1998
IEEE
15 years 6 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
120
Voted
HPCA
1998
IEEE
15 years 6 months ago
The Potential for Using Thread-Level Data Speculation to Facilitate Automatic Parallelization
As we look to the future, and the prospect of a billion transistors on a chip, it seems inevitable that microprocessors will exploit having multiple parallel threads. To achieve t...
J. Gregory Steffan, Todd C. Mowry
ASSISTIVE
1998
Springer
15 years 6 months ago
Providing Intelligent Language Feedback for Augmentative Communication Users
People with severe speech and motor impairments SSMI can often use augmentative communication devices to help them communicate. While these devices can provide speech synthesis or ...
Christopher A. Pennington, Kathleen F. McCoy
EWCBR
1998
Springer
15 years 6 months ago
Categorizing Case-Base Maintenance: Dimensions and Directions
Abstract. Experience with the growing number of large-scale CBR systems has led to increasing recognition of the importance of case-base maintenance. Multiple researchers have addr...
David B. Leake, David C. Wilson
107
Voted
WDAG
1997
Springer
106views Algorithms» more  WDAG 1997»
15 years 6 months ago
Performing Tasks on Restartable Message-Passing Processors
Abstract. This work presents new algorithms for the "Do-All" problem that consists of performing t tasks reliably in a message-passing synchronous system of p fault-prone...
Bogdan S. Chlebus, Roberto De Prisco, Alexander A....