Sciweavers

4166 search results - page 40 / 834
» Automating the constraining process
Sort
View
ICISS
2007
Springer
14 years 2 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
IJCAI
2007
13 years 10 months ago
Automated Design of Multistage Mechanisms
Mechanism design is the study of preference aggregation protocols that work well in the face of self-interested agents. We present the first general-purpose techniques for automa...
Tuomas Sandholm, Vincent Conitzer, Craig Boutilier
CANDC
2007
ACM
14 years 15 days ago
Constrain yourselves: exploring end user development in support for musical creativity
This research explores links between constraint development in creative processes and end user development in environments for creative tasks. A process model describing the devel...
Tim Coughlan, Peter Johnson
KDD
2007
ACM
197views Data Mining» more  KDD 2007»
14 years 9 months ago
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Jieping Ye, Shuiwang Ji, Jianhui Chen
TMI
2002
386views more  TMI 2002»
13 years 8 months ago
Tracking Leukocytes In Vivo with Shape and Size Constrained Active Contours
Inflammatory disease is initiated by leukocytes (white blood cells) rolling along the inner surface lining of small blood vessels called postcapillary venules. Studying the number ...
Nilanjan Ray, Scott T. Acton, Klaus Ley