Sciweavers

100 search results - page 20 / 20
» Second Tier for Decision Trees
Sort
View
OPODIS
2004
13 years 6 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
13 years 5 months ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie
TASLP
2008
131views more  TASLP 2008»
13 years 5 months ago
A Noise-Robust FFT-Based Auditory Spectrum With Application in Audio Classification
In this paper, we investigate the noise robustness of Wang and Shamma's early auditory (EA) model for the calculation of an auditory spectrum in audio classification applicati...
Wei Chu, B. Champagne
CORR
2002
Springer
142views Education» more  CORR 2002»
13 years 5 months ago
Learning Algorithms for Keyphrase Extraction
Many academic journals ask their authors to provide a list of about five to fifteen keywords, to appear on the first page of each article. Since these key words are often phrases ...
Peter D. Turney
CORR
2012
Springer
229views Education» more  CORR 2012»
12 years 1 months ago
Cops and Invisible Robbers: the Cost of Drunkenness
We examine a version of the Cops and Robber (CR) game in which the robber is invisible, i.e., the cops do not know his location until they capture him. Apparently this game (CiR) h...
Athanasios Kehagias, Dieter Mitsche, Pawel Pralat