Sciweavers

549 search results - page 59 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
SAC
2010
ACM
15 years 4 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
WAOA
2004
Springer
112views Algorithms» more  WAOA 2004»
15 years 3 months ago
Online Bin Packing with Resource Augmentation
In competitive analysis, we usually do not put any restrictions on the computational complexity of online algorithms, although efficient algorithms are preferred. Thus if such an...
Leah Epstein, Rob van Stee
NCA
2003
IEEE
15 years 3 months ago
Optimal Content Placement for En-Route Web Caching
This paper studies the optimal placement of web files for en-route web caching. It is shown that existing placement policies are all solving restricted partial problems of the ...
Anxiao Jiang, Jehoshua Bruck
DOA
2000
75views more  DOA 2000»
14 years 11 months ago
A Distributed-Object Infrastructure for Corporate Websites
A corporate website is the virtual representation of a corporation or organization on the Internet. Corporate websites face numerous problems due to their large size and complexit...
Ihor Kuz, Patrick Verkaik, Maarten van Steen, Henk...
CORR
2011
Springer
178views Education» more  CORR 2011»
14 years 1 months ago
Online Learning: Stochastic and Constrained Adversaries
Learning theory has largely focused on two main learning scenarios. The first is the classical statistical setting where instances are drawn i.i.d. from a fixed distribution and...
Alexander Rakhlin, Karthik Sridharan, Ambuj Tewari