Sciweavers

675 search results - page 79 / 135
» Predicting Performance on a Loosely Controlled Event System
Sort
View
SACMAT
2006
ACM
15 years 7 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
MM
2004
ACM
104views Multimedia» more  MM 2004»
15 years 6 months ago
Supporting continuous consistency in multiplayer online games
Multiplayer online games have become very popular in recent years. However, they generally suffer from network latency problem. If a player changes its states, it will take some ...
Frederick W. B. Li, Lewis W. F. Li, Rynson W. H. L...
HIPEAC
2007
Springer
15 years 5 months ago
Sunflower :  Full-System, Embedded Microarchitecture Evaluation
Abstract. This paper describes Sunflower, a full-system microarchitectural evaluation environment for embedded computing systems. The environment enables detailed microarchitectura...
Phillip Stanley-Marbell, Diana Marculescu
IPPS
1999
IEEE
15 years 5 months ago
DynBench: A Dynamic Benchmark Suite for Distributed Real-Time Systems
In this paper we present the architecture and framework for a benchmark suite that has been developed as part of the DeSiDeRaTa project. The proposed benchmark suite is representat...
Behrooz Shirazi, Lonnie R. Welch, Binoy Ravindran,...
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
16 years 1 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider