Sciweavers

2125 search results - page 210 / 425
» Points with Type-2 Operations
Sort
View
121
Voted
DBSEC
2000
95views Database» more  DBSEC 2000»
15 years 5 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
ECIS
2000
15 years 5 months ago
Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow Environment
Abstract-- Knowledge management is becoming a fashion in many organizations. This entails the danger that large investments in knowledge externalization are made with little short-...
Ralf Klamma, Sylvia Schlaphof
WSCG
2003
165views more  WSCG 2003»
15 years 5 months ago
A Shape Constrained Curve Approximation Method for Styling Surfaces Modeling
The problem of styling surfaces modeling is tackled. An approach based on section curves fairing is chosen. The concept of template curves is developed for approximating profiles ...
Yves Mineur
NIPS
1998
15 years 5 months ago
Outcomes of the Equivalence of Adaptive Ridge with Least Absolute Shrinkage
Adaptive Ridge is a special form of Ridge regression, balancing the quadratic penalization on each parameter of the model. It was shown to be equivalent to Lasso (least absolute s...
Yves Grandvalet, Stéphane Canu
ECSCW
1997
15 years 5 months ago
On Distribution, Drift and the Electronic Medical Record: Some Tools for a Sociology of the Formal
: Formal tools (i.e , tools that operate on circumscribed input using rules, and that contain a model of the workplace in which are to function) are attributed central roles in org...
Marc Berg