Sciweavers

2632 search results - page 343 / 527
» Management Issues in Eda
Sort
View
102
Voted
WWW
2001
ACM
16 years 5 months ago
Batch rekeying for secure group communications
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph app...
Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G....
CCS
2009
ACM
16 years 5 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
134
Voted
CHI
2009
ACM
16 years 5 months ago
Supporting volunteer activities with mobile social software
Many community organizations rely extensively on volunteer work. However, people who wish to help often have difficulties finding the time to volunteer. We are developing mobile s...
Shaun K. Kane, Predrag V. Klasnja
136
Voted
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
16 years 5 months ago
Consensus group stable feature selection
Stability is an important yet under-addressed issue in feature selection from high-dimensional and small sample data. In this paper, we show that stability of feature selection ha...
Steven Loscalzo, Lei Yu, Chris H. Q. Ding
KDD
2008
ACM
192views Data Mining» more  KDD 2008»
16 years 5 months ago
Partial least squares regression for graph mining
Attributed graphs are increasingly more common in many application domains such as chemistry, biology and text processing. A central issue in graph mining is how to collect inform...
Hiroto Saigo, Koji Tsuda, Nicole Krämer