Sciweavers

480 search results - page 94 / 96
» policy 2004
Sort
View
IADIS
2004
13 years 8 months ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
ICETE
2004
253views Business» more  ICETE 2004»
13 years 8 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
ISSA
2004
13 years 8 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi
NETWORKING
2004
13 years 8 months ago
Bounds on Benefits and Harms of Adding Connections to Noncooperative Networks
Abstract. In computer networks (and, say, transportation networks), we can consider the situation where each user has its own routing decision so as to minimize noncooperatively th...
Hisao Kameda
UAI
2004
13 years 8 months ago
Active Model Selection
Classical learning assumes the learner is given a labeled data sample, from which it learns a model. The field of Active Learning deals with the situation where the learner begins...
Omid Madani, Daniel J. Lizotte, Russell Greiner