Sciweavers

1015 search results - page 195 / 203
» On Information Regularization
Sort
View
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
SODA
2007
ACM
127views Algorithms» more  SODA 2007»
13 years 8 months ago
Line-of-sight networks
Random geometric graphs have been one of the fundamental models for reasoning about wireless networks: one places n points at random in a region of the plane (typically a square o...
Alan M. Frieze, Jon M. Kleinberg, R. Ravi, Warren ...
AAAI
2004
13 years 8 months ago
Mobile Emergency Triage Support System
We are designing and developing a mobile clinical decision support system, known as MET (Mobile Emergency Triage), for supporting emergency triage of different types of acute pain...
Wojtek Michalowski, Roman Slowinski, Szymon Wilk
IADIS
2004
13 years 8 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
FOIS
2006
13 years 8 months ago
Modular Ontology Design Using Canonical Building Blocks in the Biochemistry Domain
The field of BioInformatics has become a major venue for the development and application of computational ontologies. Ranging from controlled vocabularies to annotation of experim...
Christopher J. Thomas, Amit P. Sheth, William S. Y...