Sciweavers

1356 search results - page 12 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
LISA
2008
13 years 10 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
IJCNN
2000
IEEE
14 years 7 days ago
EM Algorithms for Self-Organizing Maps
eresting web-available abstracts and papers on clustering: An Analysis of Recent Work on Clustering Algorithms (1999), Daniel Fasulo : This paper describes four recent papers on cl...
Tom Heskes, Jan-Joost Spanjers, Wim Wiegerinck
FODO
1993
Springer
119views Algorithms» more  FODO 1993»
13 years 12 months ago
Physical Storage Organizations for Time-Dependent Multimedia Data
Abstract–Multimedia computing requires support for heterogeneous data types with differing storage, communication and delivery requirements. Continuous media data types such as ...
Huang-Jen Chen, Thomas D. C. Little
ICALP
2005
Springer
14 years 1 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
CHI
1997
ACM
14 years 1 days ago
Computational Models of Information Scent-Following in a Very Large Browsable Text Collection
An ecological-cognitive framework of analysis and a model-tracing architecture are presented and used in the analysis of data recorded from users browsing a large document collect...
Peter Pirolli