Sciweavers

977 search results - page 17 / 196
» Soft Constraints for Security
Sort
View
JETAI
2010
62views more  JETAI 2010»
14 years 8 months ago
Soft constraint problems with uncontrollable variables
Maria Silvia Pini, Francesca Rossi, Kristen Brent ...
COLING
2010
14 years 4 months ago
Grouping Product Features Using Semi-Supervised Learning with Soft-Constraints
In opinion mining of product reviews, one often wants to produce a summary of opinions based on product features/attributes. However, for the same feature, people can express it w...
Zhongwu Zhai, Bing Liu, Hua Xu, Peifa Jia
SP
1990
IEEE
15 years 1 months ago
A VMM Security Kernel for the VAX Architecture
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware,...
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin...
ICML
2007
IEEE
15 years 10 months ago
Revisiting probabilistic models for clustering with pair-wise constraints
We revisit recently proposed algorithms for probabilistic clustering with pair-wise constraints between data points. We evaluate and compare existing techniques in terms of robust...
Blaine Nelson, Ira Cohen