Sciweavers

374 search results - page 48 / 75
» Measuring Information Leakage Using Generalized Gain Functio...
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
GECCO
2004
Springer
125views Optimization» more  GECCO 2004»
14 years 28 days ago
Population-Based Iterated Local Search: Restricting Neighborhood Search by Crossover
Abstract. Iterated local search (ILS) is a powerful meta-heuristic algorithm applied to a large variety of combinatorial optimization problems. Contrary to evolutionary algorithms ...
Dirk Thierens
AUSDM
2008
Springer
367views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Categorical Proportional Difference: A Feature Selection Method for Text Categorization
Supervised text categorization is a machine learning task where a predefined category label is automatically assigned to a previously unlabelled document based upon characteristic...
Mondelle Simeon, Robert J. Hilderman
MM
2010
ACM
178views Multimedia» more  MM 2010»
13 years 7 months ago
Social audio features for advanced music retrieval interfaces
The size of personal music collections has constantly increased over the past years. As a result, the traditional metadata based lists to browse these collections have reached the...
Michael Kuhn 0002, Roger Wattenhofer, Samuel Welte...
DILS
2007
Springer
14 years 1 months ago
Fast Approximate Duplicate Detection for 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectroscopy is a powerful analytical method to elucidate the chemical structure of molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra cor...
Björn Egert, Steffen Neumann, Alexander Hinne...