Sciweavers

390 search results - page 22 / 78
» Use It or Lose It
Sort
View
ACL
1998
13 years 10 months ago
Word Association and MI-TRigger-based Language Modeling
There exists strong word association in natural language. Based on mutual information, this paper proposes a new MI-Trigger-based modeling approach to capture the preferred relati...
Guodong Zhou, Kimteng Lua
RBAC
1998
84views more  RBAC 1998»
13 years 10 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
SOSP
1997
ACM
13 years 10 months ago
Free Transactions With Rio Vista
Abstract: Transactions and recoverable memories are powerful mechanisms for handling failures and manipulating persistent data. Unfortunately, standard recoverable memories incur a...
David E. Lowell, Peter M. Chen
WSS
1997
112views Control Systems» more  WSS 1997»
13 years 10 months ago
Propagated timestamps: a scheme for the stabilization of maximum-flow routing protocols
We present a distributed protocol for maintaining a maximum flow spanning tree in a network, with a designated node as the root of the tree. This maximum flow spanning tree can be...
Jorge Arturo Cobb, Mohamed Waris
IPM
2006
167views more  IPM 2006»
13 years 9 months ago
Browsing mixed structured and unstructured data
Both structured and unstructured data, as well as structured data representing several different types of tuples, may be integrated into a single list for browsing or retrieval. D...
Robert M. Losee