Sciweavers

2421 search results - page 445 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 10 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
SAC
2004
ACM
14 years 3 months ago
A declarative framework for adaptable applications in heterogeneous environments
In this paper we present an approach for developing adaptable software applications. The problem we are facing is that of a (possibly mobile) user who wants to download and execut...
Paola Inverardi, Fabio Mancinelli, Monica Nesi
AAAI
2006
13 years 11 months ago
Model Counting: A New Strategy for Obtaining Good Bounds
Model counting is the classical problem of computing the number of solutions of a given propositional formula. It vastly generalizes the NP-complete problem of propositional satis...
Carla P. Gomes, Ashish Sabharwal, Bart Selman
TOG
2010
117views more  TOG 2010»
13 years 4 months ago
Multi-feature matching of fresco fragments
We present a multiple-feature approach for determining matches between small fragments of archaeological artifacts such as Bronze-Age and Roman frescoes. In contrast with traditio...
Corey Toler-Franklin, Benedict J. Brown, Tim Weyri...
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
12 years 9 days ago
Mining emerging patterns by streaming feature selection
Building an accurate emerging pattern classifier with a highdimensional dataset is a challenging issue. The problem becomes even more difficult if the whole feature space is unava...
Kui Yu, Wei Ding 0003, Dan A. Simovici, Xindong Wu