Sciweavers

1374 search results - page 216 / 275
» An information theoretic approach to processing management
Sort
View
CCS
2006
ACM
15 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 3 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
SEAA
2008
IEEE
15 years 4 months ago
Defect Prediction using Combined Product and Project Metrics - A Case Study from the Open Source "Apache" MyFaces Project Family
The quality evaluation of open source software (OSS) products, e.g., defect estimation and prediction approaches of individual releases, gains importance with increasing OSS adopt...
Dindin Wahyudin, Alexander Schatten, Dietmar Winkl...
EKAW
2000
Springer
15 years 1 months ago
Torture Tests: A Quantitative Analysis for the Robustness of Knowledge-Based Systems
Abstract. The overall aim of this paper is to provide a general setting for quantitative quality measures of Knowledge-Based System behavior which is widely applicable to many Know...
Perry Groot, Frank van Harmelen, Annette ten Teije
AAAI
1997
14 years 11 months ago
Deep Blue is Still an Infant
Webelieve that by the time of the workshopDeep Blue will havelost another matchto Garry Kasparov, showinglittle improvementover the previous one. But even if it is indeed a "...
Robert Levinson, Jeff Wilkinson