Sciweavers

662 search results - page 62 / 133
» Heart vs. Model
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
AO
2005
147views more  AO 2005»
13 years 7 months ago
Domain modelling and NLP: Formal ontologies? Lexica? Or a bit of both?
There are a number of genuinely open questions concerning the use of domain models in nlp. It would be great if contributors to Applied Ontology could help addressing them rather ...
Massimo Poesio
BMCBI
2004
134views more  BMCBI 2004»
13 years 7 months ago
Bayesian model accounting for within-class biological variability in Serial Analysis of Gene Expression (SAGE)
Background: An important challenge for transcript counting methods such as Serial Analysis of Gene Expression (SAGE), "Digital Northern" or Massively Parallel Signature ...
Ricardo Z. N. Vêncio, Helena Brentani, Diogo...
ICMCS
2007
IEEE
107views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Power Efficient Motion Estimation using Multiple Imprecise Metric Computations
In this paper, we propose power efficient motion estimation (ME) using multiple imprecise sum absolute difference (SAD) metric computations. We extend recent work in [18] by prov...
In Suk Chong, Antonio Ortega
NCA
2007
IEEE
14 years 2 months ago
Dynamic load balancing for network intrusion detection systems based on distributed architectures
Increasing traffic and the necessity of stateful analyses impose strong computational requirements on network intrusion detection systems (NIDS), and motivate the need of distrib...
Mauro Andreolini, Sara Casolari, Michele Colajanni...