Sciweavers

578 search results - page 102 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
14 years 3 months ago
Continuous-time behavioral portfolio selection
This paper formulates and studies a general continuous-time behavioral portfolio selection model under Kahneman and Tversky's (cumulative) prospect theory, featuring S-shaped...
Hanqing Jin, Xun Yu Zhou
CIKM
2006
Springer
14 years 20 days ago
IR principles for content-based indexing and retrieval of functional brain images
In this paper, we explore the concept of a "library of brain images", which implies not only a repository of brain images, but also efficient search and retrieval mechan...
Bing Bai, Paul B. Kantor, Nicu D. Cornea, Deborah ...
JIKM
2008
98views more  JIKM 2008»
13 years 9 months ago
Knowledge-Based Expert System Development and Validation with Petri Nets
Expert systems (ESs) are complex information systems that are expensive to build and difficult to validate. Numerous knowledge representation strategies such as rules, semantic net...
Madjid Tavana
CVPR
2011
IEEE
13 years 21 days ago
Effective 3D Object Detection and Regression Using Probabilistic Segmentation Features in CT Images
3D object detection and importance regression/ranking are at the core for semantically interpreting 3D medical images of computer aided diagnosis (CAD). In this paper, we propose ...
Le Lu, Jinbo Bi, Matthias Wolf, Marcos Salganicoff