Sciweavers

23589 search results - page 4502 / 4718
» Uncheatable Distributed Computations
Sort
View
117
Voted
AMAI
2004
Springer
15 years 8 months ago
Approximate Probabilistic Constraints and Risk-Sensitive Optimization Criteria in Markov Decision Processes
The majority of the work in the area of Markov decision processes has focused on expected values of rewards in the objective function and expected costs in the constraints. Althou...
Dmitri A. Dolgov, Edmund H. Durfee
131
Voted
CCS
2004
ACM
15 years 8 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
110
Voted
GG
2004
Springer
15 years 8 months ago
Parsing String Generating Hypergraph Grammars
A string generating hypergraph grammar is a hyperedge replacement grammar where the resulting language consists of string graphs i.e. hypergraphs modeling strings. With the help of...
Sebastian Seifert, Ingrid Fischer
144
Voted
ICS
2004
Tsinghua U.
15 years 8 months ago
CQoS: a framework for enabling QoS in shared caches of CMP platforms
Cache hierarchies have been traditionally designed for usage by a single application, thread or core. As multi-threaded (MT) and multi-core (CMP) platform architectures emerge and...
Ravi R. Iyer
110
Voted
ICS
2004
Tsinghua U.
15 years 8 months ago
Energy conservation techniques for disk array-based servers
In this paper, we study energy conservation techniques for disk array-based network servers. First, we introduce a new conservation technique, called Popular Data Concentration (P...
Eduardo Pinheiro, Ricardo Bianchini
« Prev « First page 4502 / 4718 Last » Next »