Sciweavers

1404 search results - page 110 / 281
» Complexity of admissible rules
Sort
View
CIB
2002
100views more  CIB 2002»
13 years 8 months ago
Web-log Mining for Quantitative Temporal-Event Prediction
The web log data embed much of web users' browsing behavior. From the web logs, one can discover patterns that predict the users' future requests based on their current b...
Qiang Yang, Hui Wang, Wei Zhang
AICT
2010
IEEE
216views Communications» more  AICT 2010»
13 years 20 days ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
ECOOPW
2001
Springer
14 years 1 months ago
Automating Object-Oriented Software Development Methods
Current software projects have generally to deal with producing and managing large and complex software products. It is generally believed that applying software development method...
Bedir Tekinerdogan, Motoshi Saeki, Gerson Suny&eac...
PERCOM
2005
ACM
14 years 8 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
ICDM
2005
IEEE
118views Data Mining» more  ICDM 2005»
14 years 2 months ago
A Heterogeneous Field Matching Method for Record Linkage
Record linkage is the process of determining that two records refer to the same entity. A key subprocess is evaluating how well the individual fields, or attributes, of the recor...
Steven Minton, Claude Nanjo, Craig A. Knoblock, Ma...