Sciweavers

516 search results - page 69 / 104
» Comparing Two Information Flow Security Properties
Sort
View
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 9 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
ACISP
2001
Springer
14 years 1 months ago
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
Kazumasa Omote, Atsuko Miyaji
SMI
2005
IEEE
14 years 2 months ago
Curvature Maps for Local Shape Comparison
— The ability to identify similarities between shapes is important for applications such as medical diagnosis, object registration and alignment, and shape retrieval. In this pap...
Timothy Gatzke, Cindy Grimm, Michael Garland, Stev...
CCS
2006
ACM
14 years 20 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
ISBI
2008
IEEE
14 years 9 months ago
Sift-based sequence registration and flow-based cortical vessel segmentation applied to high resolution optical imaging data
Several functional and biomedical imaging techniques rely on determining hemodynamic variables and their changes in large vascular networks. To do so at micro-vascular resolution ...
Ivo Vanzetta, Mickaël Péchaud, Renaud ...