Sciweavers

1316 search results - page 40 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
ICIP
2003
IEEE
14 years 2 months ago
Stochastic rate-control of interframe video coders for VBR channels
We propose a new algorithm for the real-time control of an interframe video coder operating with a variable rate channel such as wireless channels or the Internet. Using technique...
Julián Cabrera, José Ignacio Ronda, ...
KI
2007
Springer
14 years 3 months ago
Options in Readylog Reloaded - Generating Decision-Theoretic Plan Libraries in Golog
Readylog is a logic-based agent programming language and combines many important features from other Golog dialects. One of the features of Readylog is to make use of decision-theo...
Lutz Böhnstedt, Alexander Ferrein, Gerhard La...
SIGIR
2002
ACM
13 years 9 months ago
Using self-supervised word segmentation in Chinese information retrieval
We propose a self-supervised word-segmentation technique for Chinese information retrieval. This method combines the advantages of traditional dictionary based approaches with cha...
Fuchun Peng, Xiangji Huang, Dale Schuurmans, Nick ...
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ACSAC
2010
IEEE
13 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria