Sciweavers

349 search results - page 45 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
FLAIRS
2008
13 years 11 months ago
Learning in the Lexical-Grammatical Interface
Children are facile at both discovering word boundaries and using those words to build higher-level structures in tandem. Current research treats lexical acquisition and grammar i...
Tom Armstrong, Tim Oates
FGR
2011
IEEE
271views Biometrics» more  FGR 2011»
13 years 3 days ago
Active conditional models
— Matching images with large geometric and iconic changes (e.g. faces under different poses and facial expressions) is an open research problem in computer vision. There are two ...
Ying Chen, Fernando De la Torre
CCGRID
2008
IEEE
14 years 3 months ago
An Autonomic Workflow Management System for Global Grids
Workflow Management System is generally utilized to define, manage and execute workflow applications on Grid resources. However, the increasing scale complexity, heterogeneity and...
Mustafizur Rahman 0003, Rajkumar Buyya
STOC
2012
ACM
251views Algorithms» more  STOC 2012»
11 years 11 months ago
Minimax option pricing meets black-scholes in the limit
Option contracts are a type of financial derivative that allow investors to hedge risk and speculate on the variation of an asset’s future market price. In short, an option has...
Jacob Abernethy, Rafael M. Frongillo, Andre Wibiso...
CCS
2008
ACM
13 years 10 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß