Sciweavers

977 search results - page 21 / 196
» Soft Constraints for Security
Sort
View
CSFW
1990
IEEE
15 years 1 months ago
A New Polyinstantiation Integrity Constraint for Multilevel Relations
Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt
CPAIOR
2007
Springer
15 years 4 months ago
The Deviation Constraint
This paper introduces DEVIATION, a soft global constraint to obtain balanced solutions. A violation measure of the perfect balance can be defined as the Lp norm of the vector vari...
Pierre Schaus, Yves Deville, Pierre Dupont, Jean-C...
JSA
2000
96views more  JSA 2000»
14 years 9 months ago
Schedulability analysis of periodic and aperiodic tasks with resource constraints
In this paper, we address the problem of scheduling hybrid task sets consisting of hard periodic and soft aperiodic tasks that may share resources in exclusive mode in a dynamic e...
Giuseppe Lipari, Giorgio C. Buttazzo
NIPS
2007
14 years 11 months ago
Boosting Algorithms for Maximizing the Soft Margin
We present a novel boosting algorithm, called SoftBoost, designed for sets of binary labeled examples that are not necessarily separable by convex combinations of base hypotheses....
Manfred K. Warmuth, Karen A. Glocer, Gunnar Rä...
DSOM
2004
Springer
15 years 3 months ago
Policy-Based Resource Assignment in Utility Computing Environments
In utility computing environments, multiple users and applications are served from the same r esource pool. To maintain service level objectives and maintain high levels of utiliza...
Cipriano A. Santos, Akhil Sahai, Xiaoyun Zhu, Dirk...