Sciweavers

5435 search results - page 162 / 1087
» Informed Detection Revisited
Sort
View
CSFW
2010
IEEE
15 years 8 months ago
Information Flow in Credential Systems
—This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is n...
Moritz Y. Becker
AAAI
2010
15 years 6 months ago
Understanding the Success of Perfect Information Monte Carlo Sampling in Game Tree Search
Perfect Information Monte Carlo (PIMC) search is a practical technique for playing imperfect information games that are too large to be optimally solved. Although PIMC search has ...
Jeffrey Richard Long, Nathan R. Sturtevant, Michae...
MEDIAFORENSICS
2010
15 years 6 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
CSREASAM
2009
15 years 5 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
GI
2009
Springer
15 years 2 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson