Sciweavers

17409 search results - page 3362 / 3482
» The Design and Performance of MedJava
Sort
View
127
Voted
CCS
2006
ACM
15 years 7 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
144
Voted
CIKM
2006
Springer
15 years 7 months ago
Multi-evidence, multi-criteria, lazy associative document classification
We present a novel approach for classifying documents that combines different pieces of evidence (e.g., textual features of documents, links, and citations) transparently, through...
Adriano Veloso, Wagner Meira Jr., Marco Cristo, Ma...
161
Voted
CLEF
2006
Springer
15 years 7 months ago
TALP at GeoCLEF 2006: Experiments Using JIRS and Lucene with the ADL Feature Type Thesaurus
This paper describes our experiments in Geographical Information Retrieval (GIR) in the context of our participation in the GeoCLEF 2006 Monolingual English task. The TALPGeoIR sy...
Daniel Ferrés, Horacio Rodríguez
136
Voted
FOCS
2004
IEEE
15 years 7 months ago
Triangulation and Embedding Using Small Sets of Beacons
Concurrent with recent theoretical interest in the problem of metric embedding, a growing body of research in the networking community has studied the distance matrix defined by n...
Jon M. Kleinberg, Aleksandrs Slivkins, Tom Wexler
143
Voted
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 7 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
« Prev « First page 3362 / 3482 Last » Next »