Sciweavers

1644 search results - page 173 / 329
» Finding Dominators in Practice
Sort
View
JGAA
2006
63views more  JGAA 2006»
13 years 9 months ago
A Factor-Two Approximation Algorithm for Two-Dimensional Phase Unwrapping
Two-dimensional phase unwrapping is the problem of deducing unambiguous "phase" from values known only modulo 2. Many authors agree that the objective of phase unwrappin...
Reuven Bar-Yehuda, Irad Yavneh
JHSN
2006
100views more  JHSN 2006»
13 years 9 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
JMLR
2006
113views more  JMLR 2006»
13 years 9 months ago
Learning the Structure of Linear Latent Variable Models
We describe anytime search procedures that (1) find disjoint subsets of recorded variables for which the members of each subset are d-separated by a single common unrecorded cause...
Ricardo Silva, Richard Scheines, Clark Glymour, Pe...
EOR
2007
104views more  EOR 2007»
13 years 9 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
ETS
2007
IEEE
76views Hardware» more  ETS 2007»
13 years 9 months ago
Lifelong Learning Organisers: Requirements for Tools for Supporting Episodic and Semantic Learning
We propose Lifelong Learning Organisers (LLOs) as tools to support the capturing, organisation and retrieval of personal learning experiences, resources and notes, over a range of...
Giasemi N. Vavoula, Mike Sharples