Sciweavers

6575 search results - page 978 / 1315
» Specializing visualization algorithms
Sort
View
POLICY
2004
Springer
15 years 8 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
155
Voted
PPSN
2004
Springer
15 years 8 months ago
A Neuroevolutionary Approach to Emergent Task Decomposition
A scalable architecture to facilitate emergent (self-organized) task decomposition using neural networks and evolutionary algorithms is presented. Various control system architectu...
Jekanthan Thangavelautham, Gabriele M. T. D'Eleute...
115
Voted
SETN
2004
Springer
15 years 8 months ago
Construction and Repair: A Hybrid Approach to Search in CSPs
Abstract. In order to obtain a solution to a constraint satisfaction problem, constructive methods iteratively extend a consistent partial assignment until all problem variables ar...
Konstantinos Chatzikokolakis, George Boukeas, Pana...
108
Voted
TSD
2004
Springer
15 years 8 months ago
Handling Multi-word Expressions Without Explicit Linguistic Rules in an MT System
Abstract. Translation of Multi-word expressions (MWEs) is one of the most challenging tasks of a Machine translation (MT) system. In this paper, we present an innovative technique ...
Akshar Bharati, Rajeev Sangal, Dipti Mishra, Srira...
WISA
2004
Springer
15 years 8 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen