Sciweavers

2477 search results - page 6 / 496
» Object list controlled process data system
Sort
View
VLDB
1998
ACM
170views Database» more  VLDB 1998»
13 years 7 months ago
Advanced Data Processing in KRISYS: Modeling Concepts, Implementation Techniques, and Client/Server Issues
The increasing power of modern computers steadily opens up new application domains for advanced data processing such as engineering and knowledge-based applications. To meet their...
Stefan Deßloch, Theo Härder, Nelson Men...
IJCNN
2006
IEEE
14 years 1 months ago
An Evaluation of Over-Fit Control Strategies for Multi-Objective Evolutionary Optimization
— The optimization of classification systems is often confronted by the solution over-fit problem. Solution over-fit occurs when the optimized classifier memorizes the traini...
Paulo Vinicius Wolski Radtke, Tony Wong, Robert Sa...
SACMAT
2003
ACM
14 years 26 days ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
XMLSEC
2003
ACM
14 years 26 days ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 6 days ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...