Sciweavers

12551 search results - page 2351 / 2511
» Reuse in Systems Engineering
Sort
View
TC
2010
15 years 2 months ago
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections
—Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Prec...
Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel ...
TOPLAS
2010
93views more  TOPLAS 2010»
15 years 2 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
COMPSEC
2010
122views more  COMPSEC 2010»
15 years 2 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ACL
2010
15 years 2 months ago
Unsupervised Ontology Induction from Text
Extracting knowledge from unstructured text is a long-standing goal of NLP. Although learning approaches to many of its subtasks have been developed (e.g., parsing, taxonomy induc...
Hoifung Poon, Pedro Domingos
ACL
2010
15 years 2 months ago
Cross Lingual Adaptation: An Experiment on Sentiment Classifications
In this paper, we study the problem of using an annotated corpus in English for the same natural language processing task in another language. While various machine translation sy...
Bin Wei, Christopher Pal
« Prev « First page 2351 / 2511 Last » Next »