Sciweavers

15781 search results - page 3096 / 3157
» Evaluating Information Extraction
Sort
View
CCS
2006
ACM
14 years 1 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
AGP
2003
IEEE
14 years 1 months ago
Advanced Backjumping Techniques for Rule Instantiations
Abstract. The interest in the area of non-monotonic reasoning and declarative logic programming is growing rapidly after the recent development of a number of Answer Set Programmin...
Simona Perri, Francesco Scarcello
LCR
2000
Springer
129views System Software» more  LCR 2000»
14 years 1 months ago
Run-Time Support for Distributed Sharing in Typed Languages
We present a new run-time system for typed programming languages that supports object sharing in a distributed system. The key insight in this system is that the ability to distin...
Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wall...
PKDD
2000
Springer
144views Data Mining» more  PKDD 2000»
14 years 1 months ago
Fast Hierarchical Clustering Based on Compressed Data and OPTICS
: One way to scale up clustering algorithms is to squash the data by some intelligent compression technique and cluster only the compressed data records. Such compressed data recor...
Markus M. Breunig, Hans-Peter Kriegel, Jörg S...
DAI
1995
Springer
14 years 1 months ago
A Formal View of Social Dependence Networks
In response to the problems that have arisen regarding the terminology and concepts of agent-oriented systems, previous work has described a formal framework for understanding agen...
Mark d'Inverno, Michael Luck
« Prev « First page 3096 / 3157 Last » Next »