Sciweavers

977 search results - page 184 / 196
» Constructing informative priors using transfer learning
Sort
View
CCS
2009
ACM
14 years 9 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
QI
2009
Springer
123views Physics» more  QI 2009»
14 years 3 months ago
Hilbert Space Models Commodity Exchanges
Abstract. It is argued that the vector space measures used to measure closeness of market prices to predictors for market prices are invalid because of the observed metric of commo...
Paul Cockshott
CCS
2007
ACM
14 years 2 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
DRM
2005
Springer
14 years 2 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon