Sciweavers

88 search results - page 11 / 18
» Fight risk with risk: reflexivity of risk and globalization ...
Sort
View
ICWS
2008
IEEE
13 years 8 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICDM
2007
IEEE
134views Data Mining» more  ICDM 2007»
14 years 1 months ago
On Regional Association Rule Scoping
A special challenge for spatial data mining is that information is not distributed uniformly in spatial data sets. Consequently, the discovery of regional knowledge is of fundamen...
Wei Ding 0003, Christoph F. Eick, Xiaojing Yuan, J...
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
14 years 1 months ago
galsC: A Language for Event-Driven Embedded Systems
— We introduce galsC, a language designed for programming event-driven embedded systems such as sensor networks. galsC implements the TinyGALS programming model. At the local lev...
Elaine Cheong, Jie Liu
EVOW
2006
Springer
13 years 11 months ago
Optimisation of Constant Matrix Multiplication Operation Hardware Using a Genetic Algorithm
Abstract. The efficient design of multiplierless implementations of constant matrix multipliers is challenged by the huge solution search spaces even for small scale problems. Prev...
Andrew Kinane, Valentin Muresan, Noel E. O'Connor
SDM
2004
SIAM
162views Data Mining» more  SDM 2004»
13 years 8 months ago
Subspace Clustering of High Dimensional Data
Clustering suffers from the curse of dimensionality, and similarity functions that use all input features with equal relevance may not be effective. We introduce an algorithm that...
Carlotta Domeniconi, Dimitris Papadopoulos, Dimitr...