Sciweavers

264 search results - page 36 / 53
» ma 2010
Sort
View
SACMAT
2010
ACM
13 years 8 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
ICTAI
2010
IEEE
13 years 7 months ago
Revision Rules in the Theory of Evidence
Abstract--Combination rules proposed so far in the DempsterShafer theory of evidence, especially Dempster rule, rely on a basic assumption, that is, pieces of evidence being combin...
Jianbing Ma, Weiru Liu, Didier Dubois, Henri Prade
KR
2010
Springer
13 years 7 months ago
Computing Inconsistency Measurements under Multi-Valued Semantics by Partial Max-SAT Solvers
Measuring the inconsistency degree of a knowledge base can help us to deal with inconsistencies. Several inconsistency measures have been given under different multi-valued semant...
Guohui Xiao, Zuoquan Lin, Yue Ma, Guilin Qi
ICIP
2010
IEEE
13 years 7 months ago
Position dependent linear intra prediction for image coding
Intra prediction has been efficiently employed in block based image/video coding to remove the spatial redundancy. In this paper, we propose a position dependent linear intra pred...
Li Zhang, Siwei Ma, Wen Gao
IWCMC
2010
ACM
14 years 2 months ago
Modulation-adaptive cooperation in Rayleigh fading channels with imperfect CSI
Adaptive modulation can improve the throughput of cooperative communications, which has been shown in previous research. So far the adaptive modulation is applied with respect to ...
Yuanyuan Zhang, Yi Ma, Rahim Tafazolli