Sciweavers

1416 search results - page 78 / 284
» An Exact Interpretation of While
Sort
View
CSFW
2011
IEEE
12 years 9 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
HICSS
2007
IEEE
159views Biometrics» more  HICSS 2007»
14 years 4 months ago
Patch Review Processes in Open Source Software Development Communities: A Comparative Case Study
In spite of the overwhelming success of Free/Open Source Software (F/OSS) like Apache and GNU/Linux, there is a limited understanding of the processes and methodologies that speci...
Jai Asundi, Rajiv Jayant
AIPS
2009
13 years 11 months ago
Navigation Planning in Probabilistic Roadmaps with Uncertainty
Probabilistic Roadmaps (PRM) are a commonly used class of algorithms for robot navigation tasks where obstacles are present in the environment. We examine the situation where the ...
Michael Kneebone, Richard Dearden
ICPR
2004
IEEE
14 years 11 months ago
3D Face Pose Tracking From an Uncalibrated Monocular Camera
ct We propose a new near-real time technique for 3D face pose tracking from a monocular image sequence obtained from an uncalibrated camera. The basic idea behind our approach is t...
Qiang Ji, Zhiwei Zhu
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
14 years 10 months ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb