Sciweavers

1993 search results - page 317 / 399
» On Action Theory Change
Sort
View
CCS
2009
ACM
14 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
CHI
2009
ACM
14 years 10 months ago
iBookmark: locative texts and place-based authoring
With the recent developments in ePaper technology, consumer eBook readers have display qualities and form factors that are approaching that of traditional books. These eBook reade...
Johannes Schöning, Tom Bartindale, Patrick Ol...
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
14 years 10 months ago
Weighted graphs and disconnected components: patterns and a generator
The vast majority of earlier work has focused on graphs which are both connected (typically by ignoring all but the giant connected component), and unweighted. Here we study numer...
Mary McGlohon, Leman Akoglu, Christos Faloutsos
KDD
2008
ACM
140views Data Mining» more  KDD 2008»
14 years 10 months ago
On updates that constrain the features' connections during learning
In many multiclass learning scenarios, the number of classes is relatively large (thousands,...), or the space and time efficiency of the learning system can be crucial. We invest...
Omid Madani, Jian Huang 0002
KDD
2007
ACM
137views Data Mining» more  KDD 2007»
14 years 10 months ago
Characterising the difference
Characterising the differences between two databases is an often occurring problem in Data Mining. Detection of change over time is a prime example, comparing databases from two b...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes