Sciweavers

104 search results - page 18 / 21
» Computing interpolants in implicational logics
Sort
View
ICCS
2009
Springer
14 years 1 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
WSTST
2005
Springer
14 years 26 days ago
Soft Modeling of Group Dynamics and Behavioral Attributes
: Social networks, religion and culture of human beings play a major role in the day-to-day activities performed by each individual in group oriented missions. The aggregation and ...
Soumya Banerjee, Ajith Abraham, Sang-Yong Han, P. ...
ECSQARU
2001
Springer
13 years 12 months ago
On Anytime Coherence-Based Reasoning
Abstract. A great deal of research has been devoted to nontrivial reasoning in inconsistent knowledge bases. Coherence-based approaches proceed by a consolidation operation which s...
Frédéric Koriche
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
13 years 4 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
FGR
2011
IEEE
255views Biometrics» more  FGR 2011»
12 years 11 months ago
Beyond simple features: A large-scale feature search approach to unconstrained face recognition
— Many modern computer vision algorithms are built atop of a set of low-level feature operators (such as SIFT [1], [2]; HOG [3], [4]; or LBP [5], [6]) that transform raw pixel va...
David D. Cox, Nicolas Pinto