Sciweavers

213 search results - page 41 / 43
» Tracking the power in an enterprise decision support system
Sort
View
EUROSYS
2009
ACM
15 years 8 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
98
Voted
SIGCOMM
1991
ACM
15 years 3 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
ICSE
2008
IEEE-ACM
16 years 14 days ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su
88
Voted
GPEM
2007
113views more  GPEM 2007»
14 years 11 months ago
An evolutionary approach to cancer chemotherapy scheduling
In this paper, we investigate the employment of evolutionary algorithms as a search mechanism in a decision support system for designing chemotherapy schedules. Chemotherapy invol...
Gabriela Ochoa, Minaya Villasana, Edmund K. Burke
CODASPY
2011
14 years 3 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong