Sciweavers

1652 search results - page 291 / 331
» Power Iteration Clustering
Sort
View
AAAI
2010
14 years 7 months ago
Latent Class Models for Algorithm Portfolio Methods
Different solvers for computationally difficult problems such as satisfiability (SAT) perform best on different instances. Algorithm portfolios exploit this phenomenon by predicti...
Bryan Silverthorn, Risto Miikkulainen
ACSAC
2009
IEEE
14 years 7 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
IEEECGIV
2009
IEEE
14 years 7 months ago
TagReel: A Visualization of Tag Relations among User Interests in the Social Tagging System
Social tagging systems provide users with the ability to share information and extend their field of knowledge. The purpose of this paper is to explore the tag relations of user in...
Joohee Bae, Kyungwon Lee
IGPL
2010
142views more  IGPL 2010»
14 years 7 months ago
Logics of Kripke meta-models
This paper introduces and studies a new type of logical construction, which allows to combine various non-classical propositional logics with the temporal or modal background. The...
Sergey Babenyshev, Vladimir V. Rybakov
IJWMC
2010
115views more  IJWMC 2010»
14 years 7 months ago
Small-world effects in wireless agent sensor networks
Coverage, fault tolerance and power consumption constraints make optimal placement of mobile sensors or other mobile agents a hard problem. We have developed a model for describin...
Kenneth A. Hawick, Heath A. James