Sciweavers

11588 search results - page 225 / 2318
» Will They Like This
Sort
View
107
Voted
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 2 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
89
Voted
ESANN
2000
15 years 2 months ago
Evaluating SOMs using order metrics
It has been shown that self-organized maps, when adequately trained with the set of integers 1 to 32, lay out real numbers in a 2D map in an ordering that is superior to any of the...
Arnulfo P. Azcarraga
83
Voted
AAAI
1997
15 years 2 months ago
The Scaling of Search Cost
We show that a resealed constrainedness parameter provides the basis for accurate numerical models of search cost for both backtracking and local search algorithms. In the past, t...
Ian P. Gent, Ewan MacIntyre, Patrick Prosser, Toby...
UAI
1998
15 years 2 months ago
Learning From What You Don't Observe
The process of diagnosis involves learning about the state of a system from various observations of symptoms or findings about the system. Sophisticated Bayesian (and other) algor...
Mark A. Peot, Ross D. Shachter
100
Voted
SAM
2000
89views Hardware» more  SAM 2000»
15 years 2 months ago
HyperMSC - a Graphical Representation of TTCN
The development of an MSC based graphical representation of TTCN is part of the ETSI project STF 156 on 'Specification of a Message Sequence Chart/UML format, including valid...
Ekkart Rudolph, Ina Schieferdecker, Jens Grabowski