Sciweavers

7117 search results - page 133 / 1424
» IT Governance Frameworks as Methods
Sort
View
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 4 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
ICASSP
2009
IEEE
15 years 2 months ago
A differential motion estimation method for image interpolation in distributed video coding
Motion estimation methods based on differential techniques proved to be very useful in the context of video analysis, but have a limited employment in classical video compression ...
Marco Cagnazzo, Thomas Maugey, Béatrice Pes...
ENDM
2010
67views more  ENDM 2010»
15 years 2 months ago
An exact method for the bi-objective one-machine problem with maximum lateness and unit family setup cost objectives
This paper deals with an NP-hard bi-objective one-machine problem with ready times involving maximum lateness and unit family setup cost objectives. Considering separately both ob...
Christian Artigues, Nicolas Jozefowiez, Mohamed Al...
JMLR
2010
99views more  JMLR 2010»
14 years 11 months ago
Characterization, Stability and Convergence of Hierarchical Clustering Methods
We study hierarchical clustering schemes under an axiomatic view. We show that within this framework, one can prove a theorem analogous to one of J. Kleinberg (Kleinberg, 2002), i...
Gunnar Carlsson, Facundo Mémoli
BMCBI
2006
127views more  BMCBI 2006»
15 years 4 months ago
A graph-search framework for associating gene identifiers with documents
Background: One step in the model organism database curation process is to find, for each article, the identifier of every gene discussed in the article. We consider a relaxation ...
William W. Cohen, Einat Minkov