Sciweavers

442 search results - page 23 / 89
» What's up CAPTCHA
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 28 days ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
CHI
1993
ACM
14 years 27 days ago
Relativity controller: reflecting user perspective in document spaces
As the ease of accessing and generating large quantities of information increases, people’s ability to navigate through that information and maintain personal perspective decrea...
Eric Justin Gould
COLT
1992
Springer
14 years 26 days ago
On the Computational Power of Neural Nets
This paper deals with finite size networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a "sigmoidal&q...
Hava T. Siegelmann, Eduardo D. Sontag
CICLING
2006
Springer
14 years 16 days ago
Referring Via Document Parts
Documents in a wide range of genres often contain references to their own sections, pictures etc. We call such referring expressions instances of Document Deixis. The present work ...
Ivandré Paraboni, Kees van Deemter
ICSE
2000
IEEE-ACM
14 years 11 days ago
Software configuration management: a roadmap
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...
Jacky Estublier