Sciweavers

1701 search results - page 218 / 341
» Bandwidth Management of WiMAX Systems and Performance Modeli...
Sort
View
SACMAT
2006
ACM
15 years 10 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 8 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
IRI
2008
IEEE
15 years 10 months ago
Model check stochastic supply chains
—Supply chain [2], [6] is an important component of business operations. Understanding its stochastic behaviors is the key to risk analysis and performance evaluation in supply c...
Li Tan, Shenghan Xu
144
Voted
HICSS
2005
IEEE
165views Biometrics» more  HICSS 2005»
15 years 10 months ago
A QoS Based Model for Supporting Multimedia Applications over Cellular IP
With the increasing use of real-time multimedia applications over IP networks, efficient use of resources, especially in wireless networks, is becoming a necessity. In order to ha...
Elwalid Sidahmed, Hesham H. Ali
CIKM
2001
Springer
15 years 8 months ago
Model-based Feedback in the Language Modeling Approach to Information Retrieval
The language modeling approach to retrieval has been shown to perform well empirically. One advantage of this new approach is its statistical foundations. However, feedback, as on...
ChengXiang Zhai, John D. Lafferty