Sciweavers

1356 search results - page 12 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
98
Voted
LISA
2008
15 years 2 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
IJCNN
2000
IEEE
15 years 4 months ago
EM Algorithms for Self-Organizing Maps
eresting web-available abstracts and papers on clustering: An Analysis of Recent Work on Clustering Algorithms (1999), Daniel Fasulo : This paper describes four recent papers on cl...
Tom Heskes, Jan-Joost Spanjers, Wim Wiegerinck
87
Voted
FODO
1993
Springer
119views Algorithms» more  FODO 1993»
15 years 3 months ago
Physical Storage Organizations for Time-Dependent Multimedia Data
Abstract–Multimedia computing requires support for heterogeneous data types with differing storage, communication and delivery requirements. Continuous media data types such as ...
Huang-Jen Chen, Thomas D. C. Little
ICALP
2005
Springer
15 years 5 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
CHI
1997
ACM
15 years 3 months ago
Computational Models of Information Scent-Following in a Very Large Browsable Text Collection
An ecological-cognitive framework of analysis and a model-tracing architecture are presented and used in the analysis of data recorded from users browsing a large document collect...
Peter Pirolli