Sciweavers

374 search results - page 48 / 75
» Measuring Information Leakage Using Generalized Gain Functio...
Sort
View
184
Voted
CSFW
2010
IEEE
15 years 8 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
GECCO
2004
Springer
125views Optimization» more  GECCO 2004»
15 years 10 months ago
Population-Based Iterated Local Search: Restricting Neighborhood Search by Crossover
Abstract. Iterated local search (ILS) is a powerful meta-heuristic algorithm applied to a large variety of combinatorial optimization problems. Contrary to evolutionary algorithms ...
Dirk Thierens
AUSDM
2008
Springer
367views Data Mining» more  AUSDM 2008»
15 years 7 months ago
Categorical Proportional Difference: A Feature Selection Method for Text Categorization
Supervised text categorization is a machine learning task where a predefined category label is automatically assigned to a previously unlabelled document based upon characteristic...
Mondelle Simeon, Robert J. Hilderman
MM
2010
ACM
178views Multimedia» more  MM 2010»
15 years 5 months ago
Social audio features for advanced music retrieval interfaces
The size of personal music collections has constantly increased over the past years. As a result, the traditional metadata based lists to browse these collections have reached the...
Michael Kuhn 0002, Roger Wattenhofer, Samuel Welte...
DILS
2007
Springer
15 years 11 months ago
Fast Approximate Duplicate Detection for 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectroscopy is a powerful analytical method to elucidate the chemical structure of molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra cor...
Björn Egert, Steffen Neumann, Alexander Hinne...