Sciweavers

1627 search results - page 300 / 326
» On context in authorization policy
Sort
View
AC
2008
Springer
13 years 7 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
BIODATAMINING
2008
120views more  BIODATAMINING 2008»
13 years 7 months ago
Filling the gap between biology and computer science
This editorial introduces BioData Mining, a new journal which publishes research articles related to advances in computational methods and techniques for the extraction of useful ...
Jesús S. Aguilar-Ruiz, Jason H. Moore, Mary...
JMLR
2008
124views more  JMLR 2008»
13 years 7 months ago
Learning Control Knowledge for Forward Search Planning
A number of today's state-of-the-art planners are based on forward state-space search. The impressive performance can be attributed to progress in computing domain independen...
Sung Wook Yoon, Alan Fern, Robert Givan
MANSCI
2006
70views more  MANSCI 2006»
13 years 7 months ago
Modeling the "Pseudodeductible" in Insurance Claims Decisions
In many different managerial contexts, consumers "leave money on the table" by, for example, their failure to claim rebates, use available coupons, and so on. This proje...
Michael Braun, Peter S. Fader, Eric T. Bradlow, Ho...
COMPUTER
2002
196views more  COMPUTER 2002»
13 years 7 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...