Sciweavers

341 search results - page 48 / 69
» Learning to satisfy
Sort
View
NDSS
2006
IEEE
14 years 1 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
AIPS
2008
13 years 10 months ago
Planning 3D Task Demonstrations of a Teleoperated Space Robot Arm
We present an automated planning application for generating 3D tasks demonstrations involving a teleoperated robot arm on the International Space Station (ISS). A typical task dem...
Froduald Kabanza, Khaled Belghith, Philipe Bellefe...
ESORICS
2008
Springer
13 years 9 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
ICCV
2003
IEEE
14 years 9 months ago
Recognition with Local Features: the Kernel Recipe
Recent developments in computer vision have shown that local features can provide efficient representations suitable for robust object recognition. Support Vector Machines have be...
Christian Wallraven, Barbara Caputo, Arnulf B. A. ...
ICPR
2008
IEEE
14 years 8 months ago
Parametric video compression using appearance space
The novelty of the approach presented in this paper is the unique object-based video coding framework for videos obtained from a static camera. As opposed to most existing methods...
Santanu Chaudhury, Subarna Tripathi, Sumantra Dutt...