Sciweavers

2001 search results - page 130 / 401
» An Update on Generalized Information Theory
Sort
View
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CORR
2011
Springer
153views Education» more  CORR 2011»
14 years 5 months ago
Stability Analysis of Transportation Networks with Multiscale Driver Decisions
Stability of Wardrop equilibria is analyzed for dynamical transportation networks in which the drivers’ route choices are influenced by information at multiple temporal and spat...
Giacomo Como, Ketan Savla, Daron Acemoglu, Munther...
WWW
2006
ACM
15 years 10 months ago
Capturing RIA concepts in a web modeling language
This work addresses conceptual modeling and automatic code generation for Rich Internet Applications, a variant of Web-based systems bridging the gap between desktop and Web inter...
Alessandro Bozzon, Sara Comai, Piero Fraternali, G...
WWW
2003
ACM
15 years 10 months ago
A new paradigm for ranking pages on the world wide web
This paper describes a new paradigm for modeling traffic levels on the world wide web (WWW) using a method of entropy maximization. This traffic is subject to the conservation con...
John A. Tomlin
KDD
2004
ACM
127views Data Mining» more  KDD 2004»
15 years 10 months ago
A generative probabilistic approach to visualizing sets of symbolic sequences
There is a notable interest in extending probabilistic generative modeling principles to accommodate for more complex structured data types. In this paper we develop a generative ...
Peter Tiño, Ata Kabán, Yi Sun