Sciweavers

102 search results - page 12 / 21
» Set systems without a simplex or a cluster
Sort
View
105
Voted
JCP
2006
106views more  JCP 2006»
14 years 11 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
KDD
2005
ACM
153views Data Mining» more  KDD 2005»
16 years 2 days ago
Using retrieval measures to assess similarity in mining dynamic web clickstreams
While scalable data mining methods are expected to cope with massive Web data, coping with evolving trends in noisy data in a continuous fashion, and without any unnecessary stopp...
Olfa Nasraoui, Cesar Cardona, Carlos Rojas
MICCAI
2009
Springer
16 years 25 days ago
Tractography-Based Parcellation of the Cortex Using a Spatially-Informed Dimension Reduction of the Connectivity Matrix
Determining cortical functional areas is an important goal for neurosciences and clinical neurosurgery. This paper presents a method for connectivity-based parcellation of the enti...
Cyril Poupon, Denis Rivière, Jean-Francois ...
INFOCOM
2003
IEEE
15 years 5 months ago
Impact of Interferences on Connectivity in Ad Hoc Networks
Abstract— We study the impact of interferences on the connectivity of large-scale ad-hoc networks, using percolation theory. We assume that a bi-directional connection can be set...
Olivier Dousse, François Baccelli, Patrick ...
CCS
2006
ACM
15 years 3 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...