Sciweavers

610 search results - page 83 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
LISA
2007
15 years 2 days ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
PAKDD
2004
ACM
131views Data Mining» more  PAKDD 2004»
15 years 3 months ago
A Tree-Based Approach to the Discovery of Diagnostic Biomarkers for Ovarian Cancer
Computational diagnosis of cancer is a classification problem, and it has two special requirements on a learning algorithm: perfect accuracy and small number of features used in t...
Jinyan Li, Kotagiri Ramamohanarao
BCSHCI
2008
14 years 11 months ago
PDP: pen driven programming
Programming is an activity centred primarily around the keyboard which is not necessarily the optimal input device for all users. Little research has taken place into alternative ...
Jonathan Frye, Björn Franke
NSDI
2004
14 years 11 months ago
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks
Currently, researchers designing and implementing largescale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experiment...
Adolfo Rodriguez, Charles Edwin Killian, Sooraj Bh...
IJCAI
1993
14 years 11 months ago
Diagnosing and Solving Over-Determined Constraint Satisfaction Problems
Constraint relaxation is a frequently used technique for managing over-determined constraint satisfaction problems. A problem in constraint relaxation is the selection of the appr...
R. R. Bakker, F. Dikker, F. Tempelman, P. M. Wognu...