Sciweavers

4335 search results - page 603 / 867
» Privatizing Constraint Optimization
Sort
View
IEEEARES
2010
IEEE
15 years 9 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
DASFAA
2003
IEEE
146views Database» more  DASFAA 2003»
15 years 9 months ago
Cost-Driven Storage Schema Selection for XML
Various models and approaches have been proposed for mapping XML data into relational tables recently. Most of those approaches produce relational schema for given XML data, based...
Shihui Zheng, Ji-Rong Wen, Hongjun Lu
INFOCOM
2003
IEEE
15 years 9 months ago
Opportunistic Fair Scheduling over Multiple Wireless Channels
Abstract— Emerging spread spectrum high-speed data networks utilize multiple channels via orthogonal codes or frequency-hopping patterns such that multiple users can transmit con...
Yonghe Liu, Edward W. Knightly
ISQED
2003
IEEE
119views Hardware» more  ISQED 2003»
15 years 9 months ago
System and Framework for QA of Process Design Kits
In this paper, we evaluate the dependencies between tools, data and environment in process design kits, and present a framework for systematically analyzing the quality of the des...
M. C. Scott, M. O. Peralta, Jo Dale Carothers
PDP
2003
IEEE
15 years 9 months ago
Scheduling strategies for mixed data and task parallelism on heterogeneous clusters and grids
We consider the execution of a complex application on a heterogeneous "grid" computing platform. The complex application consists of a suite of identical, independent pr...
Olivier Beaumont, Arnaud Legrand, Yves Robert