Sciweavers

1187 search results - page 150 / 238
» Computation in Extended Argumentation Frameworks
Sort
View
PERCOM
2006
ACM
16 years 1 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
15 years 11 months ago
Constraint-Based Subspace Clustering.
In high dimensional data, the general performance of traditional clustering algorithms decreases. This is partly because the similarity criterion used by these algorithms becomes ...
Élisa Fromont, Adriana Prado, Céline...
SDM
2009
SIAM
118views Data Mining» more  SDM 2009»
15 years 11 months ago
Finding Links and Initiators: A Graph-Reconstruction Problem.
Consider a 0–1 observation matrix M, where rows correspond to entities and columns correspond to signals; a value of 1 (or 0) in cell (i, j) of M indicates that signal j has bee...
Evimaria Terzi, Heikki Mannila
EDOC
2008
IEEE
15 years 8 months ago
Using Enterprise Architecture Models for System Quality Analysis
Enterprise Architecture is a model-based approach to business-oriented IT management. To promote good IT decision making, an Enterprise Architecture framework needs to explicate w...
Per Närman, Marten Schönherr, Pontus Joh...
129
Voted
INFOCOM
2008
IEEE
15 years 8 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...