Sciweavers

4150 search results - page 248 / 830
» A Practical Approach to Model Extension
Sort
View
IEEECIT
2010
IEEE
15 years 3 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
ISPW
2010
IEEE
15 years 8 months ago
Software Process Model Blueprints
Abstract. Explicitly defining a software process model is widely recognized as a good software engineering practice. However, having a defined process does not necessarily mean tha...
Julio Ariel Hurtado Alegria, Alejandro Lagos, Alex...
ACL
2010
15 years 2 months ago
A Unified Graph Model for Sentence-Based Opinion Retrieval
There is a growing research interest in opinion retrieval as on-line users' opinions are becoming more and more popular in business, social networks, etc. Practically speakin...
Binyang Li, Lanjun Zhou, Shi Feng, Kam-Fai Wong
117
Voted
CORR
2011
Springer
135views Education» more  CORR 2011»
14 years 11 months ago
Planning with Partial Preference Models
In many real-world planning scenarios, the users are interested in optimizing multiple objectives (such as makespan and execution cost), but are unable to express their exact trad...
Tuan A. Nguyen, Minh Binh Do, Alfonso Gerevini, Iv...
AAAI
2006
15 years 5 months ago
Prob-Maxn: Playing N-Player Games with Opponent Models
Much of the work on opponent modeling for game tree search has been unsuccessful. In two-player, zero-sum games, the gains from opponent modeling are often outweighed by the cost ...
Nathan R. Sturtevant, Martin Zinkevich, Michael H....