Sciweavers

287 search results - page 9 / 58
» Availability optimization of systems subject to competing ri...
Sort
View
IFIP
2001
Springer
15 years 6 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 3 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
IJCAI
1989
15 years 3 months ago
Generating Facts From Opinions with Information Source Models
This paper describes an attempt to model the method of generating a fact from the opinions of other persons or of institutions as a process which is based on knowledge about these...
Martin Thost
HPDC
2007
IEEE
15 years 8 months ago
A fast topology inference: a building block for network-aware parallel processing
Adapting to the network is the key to achieving high performance for communication-intensive applications, including scientific computing, data intensive computing, and multicast...
Tatsuya Shirai, Hideo Saito, Kenjiro Taura
CIKM
2009
Springer
15 years 8 months ago
Learning to rank from Bayesian decision inference
Ranking is a key problem in many information retrieval (IR) applications, such as document retrieval and collaborative filtering. In this paper, we address the issue of learning ...
Jen-Wei Kuo, Pu-Jen Cheng, Hsin-Min Wang