Sciweavers

478 search results - page 58 / 96
» Some Existence and Preservation Results for Optimal Fixpoint...
Sort
View
CCS
2004
ACM
14 years 4 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
14 years 2 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
CSL
2010
Springer
13 years 11 months ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel
SOSP
2001
ACM
14 years 7 months ago
The Costs and Limits of Availability for Replicated Services
As raw system and network performance continues to improve at exponential rates, the utility of many services is increasingly limited by availability rather than performance. A ke...
Haifeng Yu, Amin Vahdat
IFIP
2004
Springer
14 years 4 months ago
Isolated Word Recognition for English Language Using LPC, VQ and HMM
: Speech recognition is always looked upon as a fascinating field in human computer interaction. It is one of the fundamental steps towards understanding human cognition and their ...
Mayukh Bhaowal, Kunal Chawla