Sciweavers

4218 search results - page 641 / 844
» Complete sets of cooperations
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
ICB
2007
Springer
142views Biometrics» more  ICB 2007»
14 years 2 months ago
Face Recognition by Discriminant Analysis with Gabor Tensor Representation
Abstract. This paper proposes a novel face recognition method based on discriminant analysis with Gabor tensor representation. Although the Gabor face representation has achieved g...
Zhen Lei, Rufeng Chu, Ran He, ShengCai Liao, Stan ...
ICDM
2007
IEEE
169views Data Mining» more  ICDM 2007»
14 years 2 months ago
Efficient Discovery of Frequent Approximate Sequential Patterns
We propose an efficient algorithm for mining frequent approximate sequential patterns under the Hamming distance model. Our algorithm gains its efficiency by adopting a "brea...
Feida Zhu, Xifeng Yan, Jiawei Han, Philip S. Yu
3DPVT
2004
IEEE
136views Visualization» more  3DPVT 2004»
14 years 2 months ago
A Unified Representation for Interactive 3D Modeling
Interactive 3D modeling is the process of building a 3D model of an object or a scene in real-time while the 3D (range) data is acquired. This is possible only if the computationa...
Dragan Tubic, Patrick Hébert, Jean-Daniel D...
ACSAC
2004
IEEE
14 years 2 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...