Sciweavers

15254 search results - page 3028 / 3051
» A k
Sort
View
SACMAT
2011
ACM
13 years 17 days ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
SACMAT
2011
ACM
13 years 17 days ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
SCL
2011
13 years 17 days ago
Regularity issues for the null-controllability of the linear 1-d heat equation
The fact that the heat equation is controllable to zero in any bounded domain of the euclidean space, any time T > 0 and from any open subset of the boundary is well known. On ...
Sorin Micu, Enrique Zuazua
SDM
2011
SIAM
218views Data Mining» more  SDM 2011»
13 years 17 days ago
Segmented nestedness in binary data
A binary matrix is fully nested if its columns form a chain of subsets; that is, any two columns are ordered by the subset relation, where we view each column as a subset of the r...
Esa Junttila, Petteri Kaski
SIGIR
2011
ACM
13 years 17 days ago
Picasso - to sing, you must close your eyes and draw
We study the problem of automatically assigning appropriate music pieces to a picture or, in general, series of pictures. This task, commonly referred to as soundtrack suggestion,...
Aleksandar Stupar, Sebastian Michel
« Prev « First page 3028 / 3051 Last » Next »