Sciweavers

1792 search results - page 314 / 359
» e-Participation and Decision Analysis
Sort
View
ISI
2006
Springer
14 years 10 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
JTAER
2008
97views more  JTAER 2008»
14 years 10 months ago
National frameworks' survey on standardization of e-Government documents and processes for interoperability
e-Government can be defined as Internet applications for public administration processes and decision making on local, regional, national as well as cross-national level. Therefor...
Malgorzata Pankowska
JUCS
2008
155views more  JUCS 2008»
14 years 10 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
JMLR
2006
190views more  JMLR 2006»
14 years 10 months ago
Causal Graph Based Decomposition of Factored MDPs
We present Variable Influence Structure Analysis, or VISA, an algorithm that performs hierarchical decomposition of factored Markov decision processes. VISA uses a dynamic Bayesia...
Anders Jonsson, Andrew G. Barto
MANSCI
2008
89views more  MANSCI 2008»
14 years 10 months ago
Research Note - When Is Versioning Optimal for Information Goods?
This paper provides insights about when versioning is an optimal strategy for information goods. Our characterization of this class of goods is that variable costs are invariant w...
Hemant K. Bhargava, Vidyanand Choudhary