Sciweavers

1520 search results - page 135 / 304
» Applying adaptation design patterns
Sort
View
SAC
2010
ACM
13 years 9 months ago
TransPeer: adaptive distributed transaction monitoring for Web2.0 applications
In emerging Web2.0 applications such as virtual worlds or social networking websites, the number of users is very important (tens of thousands), hence the amount of data to manage...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
CIE
2007
Springer
14 years 3 months ago
Hierarchies in Fragments of Monadic Strict NP
We expose a strict hierarchy within monotone monadic strict NP without inequalities (MMSNP), based on the number of second-order monadic quantifiers. We do this by studying a fin...
Barnaby Martin, Florent R. Madelaine
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 9 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
PPOPP
2005
ACM
14 years 2 months ago
A sampling-based framework for parallel data mining
The goal of data mining algorithm is to discover useful information embedded in large databases. Frequent itemset mining and sequential pattern mining are two important data minin...
Shengnan Cong, Jiawei Han, Jay Hoeflinger, David A...
IADIS
2004
13 years 10 months ago
Using the concept of user policies for improving HTML documents accessibility
In this paper, we introduce the concept of "user policies" and its applications to the browsing of HTML documents. The objective of policies is to specify user preferenc...
Benoît Encelle, Nadine Baptiste-Jessel