Sciweavers

798 search results - page 82 / 160
» Comparing the expressive power of access control models
Sort
View
JMLR
2012
11 years 11 months ago
Learning Low-order Models for Enforcing High-order Statistics
Models such as pairwise conditional random fields (CRFs) are extremely popular in computer vision and various other machine learning disciplines. However, they have limited expre...
Patrick Pletscher, Pushmeet Kohli
PIMRC
2008
IEEE
14 years 3 months ago
The Wireless Engset Multi-Rate Loss Model for the Handoff traffic analysis in W-CDMA networks
—The call-level performance modelling and evaluation of 3G cellular networks is important for the proper network dimensioning and efficient use of the network resources, such as ...
Vassilios G. Vassilakis, Michael D. Logothetis
BMCBI
2010
161views more  BMCBI 2010»
13 years 9 months ago
CGHpower: exploring sample size calculations for chromosomal copy number experiments
Background: Determining a suitable sample size is an important step in the planning of microarray experiments. Increasing the number of arrays gives more statistical power, but ad...
Ilari Scheinin, Jose A. Ferreira, Sakari Knuutila,...
CCS
2008
ACM
13 years 11 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten