Sciweavers

229 search results - page 34 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
DLOG
2010
13 years 5 months ago
The Logical Difference For Fuzzy EL+ Ontologies
Abstract. Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it i...
Shasha Feng, Yonggang Zhang, Dantong Ouyang, Haiya...
JSAC
2011
215views more  JSAC 2011»
13 years 2 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su
IEEEARES
2010
IEEE
14 years 2 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
SASO
2007
IEEE
14 years 2 months ago
Desynchronization: The Theory of Self-Organizing Algorithms for Round-Robin Scheduling
The study of synchronization has received much attention in a variety of applications, ranging from coordinating sensors in wireless networks to models of fireflies flashing in...
Ankit Patel, Julius Degesys, Radhika Nagpal
CDC
2009
IEEE
159views Control Systems» more  CDC 2009»
14 years 12 days ago
A distributed machine learning framework
Abstract— A distributed online learning framework for support vector machines (SVMs) is presented and analyzed. First, the generic binary classification problem is decomposed in...
Tansu Alpcan, Christian Bauckhage