Sciweavers

980 search results - page 196 / 196
» A Management Framework for IMS Using Service Managed Objects
Sort
View
ACSAC
2004
IEEE
13 years 9 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
JODS
2006
166views Data Mining» more  JODS 2006»
13 years 5 months ago
Model-Driven Ontology Engineering
W3C's Semantic Web provides a common framework that allows data to be shared and reused across application and enterprise. As the Semantic Web shapes the future of the Web, it...
Yue Pan, Guo Tong Xie, Li Ma, Yang Yang, Zhaoming ...
TON
2008
109views more  TON 2008»
13 years 5 months ago
On hierarchical traffic grooming in WDM networks
Abstract--The traffic grooming problem is of high practical importance in emerging wide-area wavelength division multiplexing (WDM) optical networks, yet it is intractable for any ...
Bensong Chen, George N. Rouskas, Rudra Dutta
PAMI
2008
155views more  PAMI 2008»
13 years 4 months ago
Subclass Problem-Dependent Design for Error-Correcting Output Codes
A common way to model multiclass classification problems is by means of Error-Correcting Output Codes (ECOCs). Given a multiclass problem, the ECOC technique designs a code word fo...
Sergio Escalera, David M. J. Tax, Oriol Pujol, Pet...
PODS
2011
ACM
201views Database» more  PODS 2011»
12 years 8 months ago
Data exchange beyond complete data
In the traditional data exchange setting, source instances are restricted to be complete in the sense that every fact is either true or false in these instances. Although natural ...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...