Sciweavers

2061 search results - page 116 / 413
» Authorization for Metacomputing Applications
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
15 years 1 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
134
Voted
EICS
2010
ACM
15 years 1 months ago
An automated routine for menu structure optimization
We propose an automated routine for hierarchical menu structure optimization. A computer advice-giving system founded on the mathematical model of menu navigation directs the desi...
Mikhail V. Goubko, Alexander I. Danilenko
IJAR
2010
139views more  IJAR 2010»
15 years 1 months ago
Imprecise expectations for imprecise linear filtering
In the last 10 years, there has been increasing interest in interval valued data in signal processing. According to the conventional view, an interval value supposedly reflects th...
Agnès Rico, Olivier Strauss
121
Voted
IJMDEM
2010
72views more  IJMDEM 2010»
15 years 1 months ago
Fast Caption Alignment for Automatic Indexing of Audio
For large archives of audio media, just as with text archives, indexing is important for allowing quick and accurate searches. Similar to text archives, audio archives can use tex...
Allan Knight, Kevin C. Almeroth
INFORMS
2010
147views more  INFORMS 2010»
15 years 1 months ago
Exact Algorithms for the Quadratic Linear Ordering Problem
The quadratic linear ordering problem naturally generalizes various optimization problems, such as bipartite crossing minimization or the betweenness problem, which includes linear...
Christoph Buchheim, Angelika Wiegele, Lanbo Zheng