Sciweavers

1512 search results - page 150 / 303
» When Suboptimal Rules
Sort
View
179
Voted
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
16 years 20 days ago
RAD: A Scalable Framework for Annotator Development
Developments in semantic search technology have motivated the need for efficient and scalable entity annotation techniques. We demonstrate RAD: a tool for Rapid Annotator Developme...
Sanjeet Khaitan, Ganesh Ramakrishnan, Sachindra Jo...
SIGSOFT
2007
ACM
16 years 1 days ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
CHI
2008
ACM
15 years 11 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
ATAL
2009
Springer
15 years 5 months ago
Adaptive price update in distributed Lagrangian relaxation protocol
Distributed Lagrangian Relaxation Protocol (DisLRP) has been proposed to solve a distributed combinatorial maximization problem called the Generalized Mutual Assignment Problem (G...
Katsutoshi Hirayama, Toshihiro Matsui, Makoto Yoko...
ICNP
2007
IEEE
15 years 5 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...