IIT

Results: 1929



#Item
741Query expansion / Tf*idf / Automatic summarization / Relevance / Multi-document summarization / Semantic search / Lucene / Geographic information retrieval / Search engine / Information science / Information retrieval / Science

Centrality based Document Ranking A K Singh C Ravindranath Chowdary Department of Computer Science and Engineering, IIT (BHU)

Add to Reading List

Source URL: trec.nist.gov

Language: English - Date: 2015-02-09 16:44:35
742Education in India / States and territories of India / Education in Uttar Pradesh / IIT Schools of Management / Kanpur / Indian Institutes of Technology / Association of Commonwealth Universities

First Announcement rg http://m4d.colfinder.org Images used in this banner are Creative Commons licensed. For image credits visit http://m4d.colfinder.org/imagecredits. Logos are copyrighted.

Add to Reading List

Source URL: m4d.colfinder.org

Language: English - Date: 2013-08-29 19:22:29
743Income tax in the United States / Indian Institutes of Technology / Finance / Public finance / Tax

State Administration of Taxation updates selected IIT Policies [25 September, 2009 Issues 14] On 17th August 2009, the State Administration of Taxation (SAT) issued tax notice Guo Shui FaNohereafter referr

Add to Reading List

Source URL: www.lehmanbrown.com

Language: English - Date: 2014-12-23 01:45:05
744Adjacency list / Directed graph / Hypergraph / Adjacency matrix / Centrality / Graph theory / Mathematics / Graph

Algorithms for graph compression Arindam Pal IIT Delhi / Yahoo! Research Problem description

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2011-04-17 02:31:09
745Risk management / Identity management / Actuarial science / XACML / Role-based access control / Risk / PERMIS / Mandatory access control / Discretionary access control / Security / Computer security / Access control

Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
746Logical consequence / Logical syntax / Metalogic / Metric / Logic / Deduction / Entailment

Formal Analysis of Security Metrics with Defensive Actions Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche Via G. Moruzzi 1, Pisa 561

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
747XACML / Matrix / Role-based access control / PERMIS / Security / Computer security / Access control

Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
748Network performance / Streaming / Telecommunications engineering / Outsourcing / Quality of service / Service-oriented architecture / Network architecture / Service-level agreement / Business process modeling / Management / Teletraffic / Business

Service and Protection Level Agreements for Business Processes ? Ganna Frankova and Artsiom Yautsiukhin Dept. of Information and Communication Technology - University of Trento email: {frankova,evtiukhi}@dit.unitn.it Abs

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:28:02
749Risk management / Markov processes / Decision theory / Markov models / Control theory / Risk / Markov chain / Uncertainty / Decision making / Statistics / Knowledge / Probability and statistics

Risk-aware Usage Decision Making in Highly Dynamic Systems Leanid Krautsevich, Aliaksandr Lazouski Department of Computer Science University of Pisa Largo B. Pontecorvo 3, Pisa, Italy Email: [removed]

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:28:02
750Compiler construction / Parsing / XACML / Attribute / HTML element / Software engineering / Data / Computing / Programming paradigms / Attribute grammar

1 Cost-Effective Enforcement of Access and Usage Control Policies under Uncertainties Leanid Krautsevich∗, Aliaksandr Lazouski†, Fabio Martinelli† , Artsiom Yautsiukhin† of Computer Science, University of Pisa,

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-10-09 09:04:02
UPDATE