Sciweavers

949 search results - page 136 / 190
» Theory of Constraints
Sort
View
97
Voted
CCS
2009
ACM
16 years 1 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
124
Voted
KDD
2008
ACM
140views Data Mining» more  KDD 2008»
16 years 1 months ago
On updates that constrain the features' connections during learning
In many multiclass learning scenarios, the number of classes is relatively large (thousands,...), or the space and time efficiency of the learning system can be crucial. We invest...
Omid Madani, Jian Huang 0002
82
Voted
CHI
2007
ACM
16 years 29 days ago
Modeling human performance of pen stroke gestures
This paper presents a quantitative human performance model of making single-stroke pen gestures within certain error constraints in terms of production time. Computed from the pro...
Xiang Cao, Shumin Zhai
CHI
2006
ACM
16 years 29 days ago
Generating automated predictions of behavior strategically adapted to specific performance objectives
It has been well established in Cognitive Psychology that humans are able to strategically adapt performance, even highly skilled performance, to meet explicit task goals such as ...
Katherine Eng, Richard L. Lewis, Irene Tollinger, ...
216
Voted
POPL
2005
ACM
16 years 27 days ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic