Sciweavers

15781 search results - page 3096 / 3157
» Evaluating Information Extraction
Sort
View
131
Voted
CCS
2006
ACM
15 years 7 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
133
Voted
AGP
2003
IEEE
15 years 7 months ago
Advanced Backjumping Techniques for Rule Instantiations
Abstract. The interest in the area of non-monotonic reasoning and declarative logic programming is growing rapidly after the recent development of a number of Answer Set Programmin...
Simona Perri, Francesco Scarcello
136
Voted
LCR
2000
Springer
129views System Software» more  LCR 2000»
15 years 7 months ago
Run-Time Support for Distributed Sharing in Typed Languages
We present a new run-time system for typed programming languages that supports object sharing in a distributed system. The key insight in this system is that the ability to distin...
Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wall...
152
Voted
PKDD
2000
Springer
144views Data Mining» more  PKDD 2000»
15 years 7 months ago
Fast Hierarchical Clustering Based on Compressed Data and OPTICS
: One way to scale up clustering algorithms is to squash the data by some intelligent compression technique and cluster only the compressed data records. Such compressed data recor...
Markus M. Breunig, Hans-Peter Kriegel, Jörg S...
111
Voted
DAI
1995
Springer
15 years 7 months ago
A Formal View of Social Dependence Networks
In response to the problems that have arisen regarding the terminology and concepts of agent-oriented systems, previous work has described a formal framework for understanding agen...
Mark d'Inverno, Michael Luck
« Prev « First page 3096 / 3157 Last » Next »