Sciweavers

9730 search results - page 1691 / 1946
» Relating models of backtracking
Sort
View
152
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 6 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
EMNLP
2008
15 years 6 months ago
Mention Detection Crossing the Language Barrier
While significant effort has been put into annotating linguistic resources for several languages, there are still many left that have only small amounts of such resources. This p...
Imed Zitouni, Radu Florian
GECCO
2008
Springer
147views Optimization» more  GECCO 2008»
15 years 6 months ago
On selecting the best individual in noisy environments
In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Wojciech Jaskowski, Wojciech Kotlowski
ICML
2010
IEEE
15 years 6 months ago
Local Minima Embedding
Dimensionality reduction is a commonly used step in many algorithms for visualization, classification, clustering and modeling. Most dimensionality reduction algorithms find a low...
Minyoung Kim, Fernando De la Torre
CAISE
2010
Springer
15 years 5 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
« Prev « First page 1691 / 1946 Last » Next »