Sciweavers

1168 search results - page 46 / 234
» cases 2000
Sort
View
ACSAC
2000
IEEE
14 years 19 hour ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
PUC
2000
70views more  PUC 2000»
13 years 7 months ago
Mobile Computers in a Community NHS Trust: Is this a Relevant Context and Environment for their Use?
This paper describes a case study in which mobile computers were used by a UK NHS Trust. The intention was to give clinicians access to up to date patient data enabling them to be...
Barbara McManus
NIPS
2000
13 years 9 months ago
Ensemble Learning and Linear Response Theory for ICA
We propose a general framework for performing independent component analysis (ICA) which relies on ensemble learning and linear response theory known from statistical physics. We ...
Pedro A. d. F. R. Højen-Sørensen, Ol...
SIAMJO
2000
61views more  SIAMJO 2000»
13 years 7 months ago
Stability of Locally Optimal Solutions
: Necessary and sufficient conditions are obtained for the Lipschitzian stability of local solutions to finite-dimensional parameterized optimization problems in a very general set...
A. B. Levy, R. A. Poliquin, R. Tyrell Rockafellar
ERCIMDL
2000
Springer
246views Education» more  ERCIMDL 2000»
13 years 11 months ago
Automatic Web Rating: Filtering Obscene Content on the Web
We present a method to detect automatically pornographic content on the Web. Our method combines techniques from language engineering and image analysis within a machine-learning f...
Konstantinos Chandrinos, Ion Androutsopoulos, Geor...