Sciweavers

18306 search results - page 3520 / 3662
» Algorithmics in Exponential Time
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 3 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ICDM
2007
IEEE
99views Data Mining» more  ICDM 2007»
14 years 3 months ago
Optimizing Frequency Queries for Data Mining Applications
Data mining algorithms use various Trie and bitmap-based representations to optimize the support (i.e., frequency) counting performance. In this paper, we compare the memory requi...
Hassan H. Malik, John R. Kender
ICEBE
2007
IEEE
126views Business» more  ICEBE 2007»
14 years 3 months ago
Consumer-Centric Web Services Discovery and Subscription
Nowadays, there are a number of similar web services over the internet or intranet. They provide consumers with more choices according to their personalized QoS requirements. Howe...
Xuanzhe Liu, Li Zhou, Gang Huang, Hong Mei
ICSM
2007
IEEE
14 years 3 months ago
Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment
Parallel developments are becoming increasingly prevalent in the building and evolution of large-scale software systems. Our previous studies of a large industrial project showed ...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
IJCNN
2007
IEEE
14 years 3 months ago
Robotic Architecture Inspired on Behavior Analysis
Learning by human tutelage means that a human being guides the attention of a robot or agent in order to teach it a given concept. This kind of learning is very important to devel...
Claudio A. Policastro, Roseli A. F. Romero, Giovan...
« Prev « First page 3520 / 3662 Last » Next »