Sciweavers

2111 search results - page 325 / 423
» Understanding the Yarowsky Algorithm
Sort
View
117
Voted
SACMAT
2009
ACM
15 years 7 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
108
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Acyclic Type of Relationships Between Autonomous Systems
Abstract— The Internet connectivity in the Autonomous System (AS) level reflects the commercial relationship between ASes. A connection between two ASes could be of type custome...
Rami Cohen, Danny Raz
122
Voted
KI
2007
Springer
15 years 6 months ago
Pinpointing in the Description Logic EL+
Axiom pinpointing has been introduced in description logics (DLs) to help the user understand the reasons why consequences hold by computing minimal subsets of the knowledge base t...
Franz Baader, Rafael Peñaloza, Boontawee Su...
102
Voted
CVPR
2006
IEEE
15 years 6 months ago
Fast Compact City Modeling for Navigation Pre-Visualization
Nowadays, GPS-based car navigation systems mainly use speech and aerial views of simplified road maps to guide drivers to their destination. However, drivers often experience dif...
Nico Cornelis, Kurt Cornelis, Luc J. Van Gool
119
Voted
CONEXT
2006
ACM
15 years 6 months ago
Modeling the AIADD paradigm in networks with variable delays
Modeling TCP is fundamental for understanding Internet behavior. The reason is that TCP is responsible for carrying a huge quota of the Internet traffic. During last decade many a...
Gennaro Boggia, Pietro Camarda, Alessandro D'Alcon...