Sciweavers

13383 search results - page 2273 / 2677
» Abstractions from proofs
Sort
View
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
15 years 2 months ago
Detecting Novel Discrepancies in Communication Networks
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
James Abello, Tina Eliassi-Rad, Nishchal Devanur
ICDM
2010
IEEE
109views Data Mining» more  ICDM 2010»
15 years 2 months ago
Term Filtering with Bounded Error
Abstract--In this paper, we consider a novel problem referred to as term filtering with bounded error to reduce the term (feature) space by eliminating terms without (or with bound...
Zi Yang, Wei Li, Jie Tang, Juanzi Li
ICICS
2010
Springer
15 years 2 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
227
Voted
ICOODB
2010
171views Database» more  ICOODB 2010»
15 years 2 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
ICSOC
2010
Springer
15 years 2 months ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
« Prev « First page 2273 / 2677 Last » Next »