Sciweavers

14898 search results - page 2865 / 2980
» Design of Neural Networks
Sort
View
EUROSYS
2011
ACM
14 years 8 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
130
Voted
JAMIA
2011
94views more  JAMIA 2011»
14 years 7 months ago
Protein-network modeling of prostate cancer gene signatures reveals essential pathways in disease recurrence
Objective Uncovering the dominant molecular deregulation among the multitude of pathways implicated in aggressive prostate cancer is essential to intelligently developing targeted...
James L. Chen, Jianrong Li, Walter M. Stadler, Yve...
SACMAT
2011
ACM
14 years 7 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
SIGIR
2011
ACM
14 years 7 months ago
Social context summarization
We study a novel problem of social context summarization for Web documents. Traditional summarization research has focused on extracting informative sentences from standard docume...
Zi Yang, Keke Cai, Jie Tang, Li Zhang, Zhong Su, J...
CIKM
2011
Springer
14 years 4 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
« Prev « First page 2865 / 2980 Last » Next »