Sciweavers

6300 search results - page 1069 / 1260
» We have it easy, but do we have it right
Sort
View
SACMAT
2009
ACM
15 years 8 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
EDOC
2008
IEEE
15 years 8 months ago
Facebook Meets the Virtualized Enterprise
: “Web 2.0” and “cloud computing” are revolutionizing the way IT infrastructure is accessed and managed. Web 2.0 technologies such as blogs, wikis and social networking pla...
Roger Curry, Cameron Kiddle, Nayden Markatchev, Ro...
ICDCS
2008
IEEE
15 years 8 months ago
Measurement Manipulation and Space Selection in Network Coordinates
Internet coordinate systems have emerged as an efficient method to estimate the latency between pairs of nodes without any communication between them. However, most coordinate sy...
Cristian Lumezanu, Neil Spring
MICRO
2008
IEEE
72views Hardware» more  MICRO 2008»
15 years 7 months ago
Low-power, high-performance analog neural branch prediction
Shrinking transistor sizes and a trend toward low-power processors have caused increased leakage, high per-device variation and a larger number of hard and soft errors. Maintainin...
Renée St. Amant, Daniel A. Jiménez, ...
ACIVS
2008
Springer
15 years 7 months ago
Scene Reconstruction Using MRF Optimization with Image Content Adaptive Energy Functions
Multi-view scene reconstruction from multiple uncalibrated images can be solved by two stages of processing: first, a sparse reconstruction using Structure From Motion (SFM), and ...
Ping Li, Rene Klein Gunnewiek, Peter H. N. de With
« Prev « First page 1069 / 1260 Last » Next »