Sciweavers

6147 search results - page 47 / 1230
» Requirements, Architectures and Risks
Sort
View
WISE
2002
Springer
15 years 4 months ago
An Update-Risk Based Approach to TTL Estimation in Web Caching
Web caching is an important technique for accelerating web applications and reducing the load on the web server and the network through local cache accesses. As in the traditional...
Jeong-Joon Lee, Kyu-Young Whang, Byung Suk Lee, Ji...
KDD
2004
ACM
179views Data Mining» more  KDD 2004»
16 years 7 days ago
1-dimensional splines as building blocks for improving accuracy of risk outcomes models
Transformation of both the response variable and the predictors is commonly used in fitting regression models. However, these transformation methods do not always provide the maxi...
David S. Vogel, Morgan C. Wang
BMCBI
2011
14 years 6 months ago
A comparison and user-based evaluation of models of textual information structure in the context of cancer risk assessment
Background: Many practical tasks in biomedicine require accessing specific types of information in scientific literature; e.g. information about the results or conclusions of the ...
Yufan Guo, Anna Korhonen, Maria Liakata, Ilona Sil...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 11 days ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
IEEEARES
2010
IEEE
15 years 6 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty