Sciweavers

700 search results - page 81 / 140
» Enterprise Computing
Sort
View
IJCAI
2003
13 years 11 months ago
On the Foundations of Expected Expected Utility
Intelligent agents often need to assess user utility functions in order to make decisions on their behalf, or predict their behavior. When uncertainty exists over the precise natu...
Craig Boutilier
MASCOTS
2003
13 years 11 months ago
An integrated performance model of disk arrays
All enterprise storage systems depend on disk arrays to satisfy their capacity, reliability, and availability requirements. Performance models of disk arrays are useful in underst...
Elizabeth Varki, Arif Merchant, Jianzhang Xu, Xiao...
WSC
1997
13 years 11 months ago
Conduct, Misconduct, and Cargo Cult Science
I will elaborate some principles of ethical conduct in science that correspond to Richard Feynman’s wellknown precepts of “utter honesty” and “leaning over backwards” in...
James R. Wilson
SACMAT
2010
ACM
13 years 10 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh