Sciweavers

565 search results - page 55 / 113
» A logic for authorization provenance
Sort
View
TIM
2010
144views Education» more  TIM 2010»
13 years 3 months ago
Extending Polynomial Chaos to Include Interval Analysis
Polynomial chaos theory (PCT) has been proven to be an efficient and effective way to represent and propagate uncertainty through system models and algorithms in general. In partic...
Antonello Monti, Ferdinanda Ponci, Marco Valtorta
PAKDD
2011
ACM
253views Data Mining» more  PAKDD 2011»
12 years 11 months ago
Balance Support Vector Machines Locally Using the Structural Similarity Kernel
A structural similarity kernel is presented in this paper for SVM learning, especially for learning with imbalanced datasets. Kernels in SVM are usually pairwise, comparing the sim...
Jianxin Wu
CSFW
2007
IEEE
14 years 3 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
SLOGICA
2002
81views more  SLOGICA 2002»
13 years 8 months ago
Bicartesian Coherence
A survey is given of results about coherence for categories with finite products and coproducts. For these results, which were published previously by the authors in several places...
Kosta Dosen, Zoran Petric
MMMACNS
2010
Springer
13 years 7 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...