Sciweavers

67 search results - page 13 / 14
» On Inferences of Full Hierarchical Dependencies
Sort
View
SACMAT
2006
ACM
13 years 11 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
TNN
1998
114views more  TNN 1998»
13 years 5 months ago
Bayesian retrieval in associative memories with storage errors
Abstract—It is well known that for finite-sized networks, onestep retrieval in the autoassociative Willshaw net is a suboptimal way to extract the information stored in the syna...
Friedrich T. Sommer, Peter Dayan
BMCBI
2008
132views more  BMCBI 2008»
13 years 5 months ago
Computational cluster validation for microarray data analysis: experimental assessment of Clest, Consensus Clustering, Figure of
Background: Inferring cluster structure in microarray datasets is a fundamental task for the so-called -omic sciences. It is also a fundamental question in Statistics, Data Analys...
Raffaele Giancarlo, Davide Scaturro, Filippo Utro
BMCBI
2004
177views more  BMCBI 2004»
13 years 5 months ago
Gapped alignment of protein sequence motifs through Monte Carlo optimization of a hidden Markov model
Background: Certain protein families are highly conserved across distantly related organisms and belong to large and functionally diverse superfamilies. The patterns of conservati...
Andrew F. Neuwald, Jun S. Liu
SIGIR
2010
ACM
13 years 9 months ago
Personalizing information retrieval for multi-session tasks: the roles of task stage and task type
Dwell time as a user behavior has been found in previous studies to be an unreliable predictor of document usefulness, with contextual factors such as the user’s task needing to...
Jingjing Liu, Nicholas J. Belkin