Sciweavers

3093 search results - page 345 / 619
» The Multi-perspective Process Explorer
Sort
View
114
Voted
SACMAT
2003
ACM
15 years 8 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
135
Voted
COLT
2003
Springer
15 years 8 months ago
Preference Elicitation and Query Learning
Abstract. In this paper we initiate an exploration of relationships between “preference elicitation”, a learning-style problem that arises in combinatorial auctions, and the pr...
Avrim Blum, Jeffrey C. Jackson, Tuomas Sandholm, M...
130
Voted
HUC
2003
Springer
15 years 8 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
134
Voted
ICCAD
2002
IEEE
100views Hardware» more  ICCAD 2002»
15 years 8 months ago
Optimal buffered routing path constructions for single and multiple clock domain systems
Shrinking process geometries and the increasing use of IP components in SoC designs give rise to new problems in routing and buffer insertion. A particular concern is that cross-c...
Soha Hassoun, Charles J. Alpert, Meera Thiagarajan
ITCC
2002
IEEE
15 years 8 months ago
Providing an Infrastructure for A Cross Database Management Tool
Software tools used to administer databases are vendor specific, proprietary, and require extensive prior database knowledge on the part of the database professional. We present d...
Régis Charlot