Sciweavers

1691 search results - page 119 / 339
» Restricted subset selection
Sort
View
NETWORKING
2004
13 years 11 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
AAAI
1994
13 years 11 months ago
A Description Classifier for the Predicate Calculus
A description classifier organizes concepts and relations into a taxonomy based on the results of subsumption computations applied to pairs of relation definitions. Until now, des...
Robert M. MacGregor
AIPS
1994
13 years 11 months ago
Solving Time-critical Decision-making Problems with Predictable Computational Demands
In this work we present an approach to solving time-critical decision-making problems by taking advantage of domain structure to expand the amountof time available for processing ...
Thomas Dean, Lloyd Greenwald
ATAL
2010
Springer
13 years 11 months ago
Characterising and matching iterative and recursive agent interaction protocols
For an agent to intelligently use specifications of executable protocols, it is necessary that the agent can quickly and correctly assess the outcomes of that protocol if it is ex...
Tim Miller, Peter McBurney
DBSEC
2010
128views Database» more  DBSEC 2010»
13 years 10 months ago
On the Identification of Property Based Generalizations in Microdata Anonymization
Abstract. Majority of the search algorithms in microdata anonymization restrict themselves to a single privacy property and a single criteria to optimize. The solutions obtained ar...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...