Sciweavers

686 search results - page 73 / 138
» Nonmonotonic inference operations
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
SIGCOMM
2006
ACM
14 years 3 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
PKDD
2005
Springer
122views Data Mining» more  PKDD 2005»
14 years 3 months ago
A Probabilistic Clustering-Projection Model for Discrete Data
For discrete co-occurrence data like documents and words, calculating optimal projections and clustering are two different but related tasks. The goal of projection is to find a ...
Shipeng Yu, Kai Yu, Volker Tresp, Hans-Peter Krieg...
SIGMOD
1999
ACM
98views Database» more  SIGMOD 1999»
14 years 2 months ago
Self-tuning Histograms: Building Histograms Without Looking at Data
In this paper, we introduce self-tuning histograms. Although similar in structure to traditional histograms, these histograms infer data distributions not by examining the data or...
Ashraf Aboulnaga, Surajit Chaudhuri
ICLP
2007
Springer
14 years 1 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...