Sciweavers

1486 search results - page 154 / 298
» Firewall Rules Analysis
Sort
View
SOUPS
2010
ACM
15 years 8 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
SETP
2007
15 years 5 months ago
Dimensional Inference Using Symbol Lives
Scientific equations embedded in computer programs must obey the rules for dimensional consistency. Many efforts have been made to enforce these rules within computer programs. So...
Brian Farrimond, John Collins
DGO
2006
113views Education» more  DGO 2006»
15 years 5 months ago
Progress in language processing technology for electronic rulemaking
In this project, we are developing new text processing tools that help people perform advanced analysis of large collections of text commentary. This problem is increasingly faced...
Stuart W. Shulman, Eduard H. Hovy, Jamie Callan, S...
TNN
2008
102views more  TNN 2008»
15 years 4 months ago
A Class of Complex ICA Algorithms Based on the Kurtosis Cost Function
In this paper, we introduce a novel way of performing real-valued optimization in the complex domain. This framework enables a direct complex optimization technique when the cost f...
Hualiang Li, Tülay Adali
URBAN
2008
128views more  URBAN 2008»
15 years 4 months ago
Discerning landslide susceptibility using rough sets
Rough set theory has been primarily known as a mathematical approach for analysis of a vague description of objects. This paper explores the use of rough set theory to manage the ...
Pece V. Gorsevski, Piotr Jankowski