Sciweavers

2516 search results - page 481 / 504
» When is there a representer theorem
Sort
View
LISA
2007
13 years 10 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
WSC
2008
13 years 10 months ago
Assignment of probabilities to events for combat simulation
Multitrajectory simulation allows explicit management of random events by allowing particular events to be resolved by random draw, by a deterministic choice, or by creating new s...
John B. Gilmer Jr., Frederick J. Sullivan
ACMDIS
2008
ACM
13 years 10 months ago
Evaluating the effectiveness of term frequency histograms for supporting interactive web search tasks
Throughout many of the different types of Web searches people perform, the primary tasks are to first craft a query that effectively captures their information needs, and then eva...
Orland Hoeber, Xue Dong Yang
ATAL
2008
Springer
13 years 10 months ago
An adaptive probabilistic trust model and its evaluation
In open settings, the participants are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relie...
Chung-Wei Hang, Yonghong Wang, Munindar P. Singh
CIKM
2008
Springer
13 years 10 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho