Sciweavers

5333 search results - page 152 / 1067
» Optimizing Computer System Configurations
Sort
View
138
Voted
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 3 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
131
Voted
CSCW
2000
ACM
15 years 2 months ago
Workflow Systems: Occasions for Success and Failure
Abstract. Workflow technologies have created considerable discussion within the computer supported cooperative work community. Although a number of theoretical and empirical warnin...
Rebecca E. Grinter
111
Voted
SIGGRAPH
1994
ACM
15 years 6 months ago
Fast contact force computation for nonpenetrating rigid bodies
A new algorithm for computing contact forces between solid objects with friction is presented. The algorithm allows a mix of contact points with static and dynamic friction. In co...
David Baraff
129
Voted
DSOM
2005
Springer
15 years 8 months ago
Towards Automated Deployment of Built-to-Order Systems
Abstract. End-to-end automated application design and deployment poses a significant technical challenge. With increasing scale and complexity of IT systems and the manual handling...
Akhil Sahai, Calton Pu, Gueyoung Jung, Qinyi Wu, W...
129
Voted
FSS
2008
134views more  FSS 2008»
15 years 2 months ago
A study of the behaviour of linguistic fuzzy rule based classification systems in the framework of imbalanced data-sets
In the field of classification problems, we often encounter classes with a very different percentage of patterns between them, classes with a high pattern percentage and classes w...
Alberto Fernández, Salvador García, ...