Sciweavers

1368 search results - page 246 / 274
» Personality-Based Practical Reasoning
Sort
View
POLICY
2007
Springer
15 years 8 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 8 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
DASC
2006
IEEE
15 years 8 months ago
Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters
Blade severs are being increasingly deployed in modern datacenters due to their high performance/cost ratio and compact size. In this study, we document our work on blade server b...
Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzion...
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
15 years 7 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
ICRA
2006
IEEE
190views Robotics» more  ICRA 2006»
15 years 7 months ago
An Integrated Approach to Inverse Kinematics and Path Planning for Redundant Manipulators
— We propose a novel solution to the problem of inverse kinematics for redundant robotic manipulators for the purposes of goal selection for path planning. We unify the calculati...
Dominik Bertram, James Kuffner, Rüdiger Dillm...