Sciweavers

796 search results - page 133 / 160
» Spoofing prevention method
Sort
View
NSPW
1998
ACM
14 years 2 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
ATAL
2006
Springer
14 years 1 months ago
MDPOP: faithful distributed implementation of efficient social choice problems
We model social choice problems in which self interested agents with private utility functions have to agree on values for a set of variables subject to side constraints. The goal...
Adrian Petcu, Boi Faltings, David C. Parkes
CP
2006
Springer
14 years 1 months ago
Dynamic Symmetry Breaking Restarted
ion of a given partial assignment of values to variables. Compared with other symmetry breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodat...
Daniel S. Heller, Meinolf Sellmann
BMCBI
2010
122views more  BMCBI 2010»
13 years 10 months ago
Ovarian cancer classification based on dimensionality reduction for SELDI-TOF data
Background: Recent advances in proteomics technologies such as SELDI-TOF mass spectrometry has shown promise in the detection of early stage cancers. However, dimensionality reduc...
Kai-Lin Tang, Tong-Hua Li, Wen-Wei Xiong, Kai Chen
BMCBI
2010
119views more  BMCBI 2010»
13 years 10 months ago
A comparison of internal validation techniques for multifactor dimensionality reduction
Background: It is hypothesized that common, complex diseases may be due to complex interactions between genetic and environmental factors, which are difficult to detect in high-di...
Stacey J. Winham, Andrew J. Slater, Alison A. Mots...