Sciweavers

287 search results - page 9 / 58
» Availability optimization of systems subject to competing ri...
Sort
View
IFIP
2001
Springer
14 years 12 days ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 9 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
IJCAI
1989
13 years 9 months ago
Generating Facts From Opinions with Information Source Models
This paper describes an attempt to model the method of generating a fact from the opinions of other persons or of institutions as a process which is based on knowledge about these...
Martin Thost
HPDC
2007
IEEE
14 years 2 months ago
A fast topology inference: a building block for network-aware parallel processing
Adapting to the network is the key to achieving high performance for communication-intensive applications, including scientific computing, data intensive computing, and multicast...
Tatsuya Shirai, Hideo Saito, Kenjiro Taura
CIKM
2009
Springer
14 years 2 months ago
Learning to rank from Bayesian decision inference
Ranking is a key problem in many information retrieval (IR) applications, such as document retrieval and collaborative filtering. In this paper, we address the issue of learning ...
Jen-Wei Kuo, Pu-Jen Cheng, Hsin-Min Wang