Sciweavers

229 search results - page 29 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
125
Voted
VISUALIZATION
1997
IEEE
15 years 7 months ago
Application-controlled demand paging for out-of-core visualization
In the area of scientific visualization, input data sets are often very large. In visualization of Computational Fluid Dynamics (CFD) in particular, input data sets today can surp...
Michael Cox, David Ellsworth
INFOCOM
2009
IEEE
15 years 10 months ago
Minimizing Rulesets for TCAM Implementation
—Packet classification is a function increasingly used in a number of networking appliances and applications. Typically, sists of a set of abstract classifications, and a set o...
Rick McGeer, Praveen Yalagandula
130
Voted
SPAA
2006
ACM
15 years 9 months ago
Playing push vs pull: models and algorithms for disseminating dynamic data in networks
Consider a network in which a collection of source nodes maintain and periodically update data objects for a collection of sink nodes, each of which periodically accesses the data...
R. C. Chakinala, Abishek Kumarasubramanian, Kofi A...
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
15 years 7 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner
145
Voted
LCPC
2005
Springer
15 years 9 months ago
Concurrency Analysis for Parallel Programs with Textually Aligned Barriers
Abstract. A fundamental problem in the analysis of parallel programs is to determine when two statements in a program may run concurrently. This analysis is the parallel analog to ...
Amir Kamil, Katherine A. Yelick