Sciweavers

1998 search results - page 109 / 400
» Situated Control Rules
Sort
View
ESANN
2004
15 years 5 months ago
Towards a Local Separation Performances Estimator Using Common ICA Contrast Functions?
Abstract. In most ICA algorithms, the separation performances are estimated through the evaluation of a contrast function , used in the update rule of elements of the unmixing matr...
Frédéric Vrins, Cédric Archam...
158
Voted
ACSAC
2002
IEEE
15 years 9 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
SIGCOMM
2010
ACM
15 years 4 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
123
Voted
IR
2008
15 years 4 months ago
A probability ranking principle for interactive information retrieval
The classical Probability Ranking Principle (PRP) forms the theoretical basis for probabilistic Information Retrieval (IR) models, which are dominating IR theory since about 20 ye...
Norbert Fuhr
126
Voted
ACSAC
2003
IEEE
15 years 9 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli