Sciweavers

932 search results - page 156 / 187
» Capturing, sharing, and using local place information
Sort
View
ACSAC
2002
IEEE
14 years 27 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
CVPR
2005
IEEE
14 years 10 months ago
Tangent-Corrected Embedding
Images and other high-dimensional data can frequently be characterized by a low dimensional manifold (e.g. one that corresponds to the degrees of freedom of the camera). Recently,...
Ali Ghodsi, Jiayuan Huang, Finnegan Southey, Dale ...
BMCBI
2005
77views more  BMCBI 2005»
13 years 7 months ago
Ontological visualization of protein-protein interactions
Background: Cellular processes require the interaction of many proteins across several cellular compartments. Determining the collective network of such interactions is an importa...
Harold J. Drabkin, Christopher Hollenbeck, David P...
DAC
2005
ACM
13 years 10 months ago
How accurately can we model timing in a placement engine?
This paper presents a novel placement algorithm for timing optimization based on a new and powerful concept, which we term differential timing analysis. Recognizing that accurate ...
Amit Chowdhary, Karthik Rajagopal, Satish Venkates...
WSDM
2012
ACM
334views Data Mining» more  WSDM 2012»
12 years 3 months ago
mTrust: discerning multi-faceted trust in a connected world
Traditionally, research about trust assumes a single type of trust between users. However, trust, as a social concept, inherently has many facets indicating multiple and heterogen...
Jiliang Tang, Huiji Gao, Huan Liu