Sciweavers

19587 search results - page 3778 / 3918
» Systems Engineering for software Engineers
Sort
View
SIGPRO
2010
137views more  SIGPRO 2010»
15 years 3 months ago
Satellite image compression by post-transforms in the wavelet domain
This paper proposes a novel compression scheme with a tunable complexity-ratedistortion trade-off. As images increase in size and resolution, more efficient compression schemes w...
Xavier Delaunay, Marie Chabert, Vincent Charvillat...
TC
2010
15 years 3 months ago
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections
—Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Prec...
Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel ...
TOPLAS
2010
93views more  TOPLAS 2010»
15 years 3 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
WIOPT
2010
IEEE
15 years 3 months ago
Enhancing RRM optimization using a priori knowledge for automated troubleshooting
—The paper presents a methodology that combines statistical learning with constraint optimization by locally optimizing Radio Resource Management (RRM) or system parameters of po...
Moazzam Islam Tiwana, Zwi Altman, Berna Sayra&cced...
COMPSEC
2010
122views more  COMPSEC 2010»
15 years 3 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
« Prev « First page 3778 / 3918 Last » Next »