Sciweavers

92 search results - page 9 / 19
» Maintaining privacy on derived objects
Sort
View
EUC
2007
Springer
14 years 4 months ago
An Activity-Centered Wearable Computing Infrastructure for Intelligent Environment Applications
There are many research efforts that focus on converting everyday environments into intelligent and computationally active environments that support and enhance the abilities of it...
Dipak Surie, Thomas Pederson
ESORICS
2007
Springer
14 years 4 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
NIPS
2007
13 years 11 months ago
Agreement-Based Learning
The learning of probabilistic models with many hidden variables and nondecomposable dependencies is an important and challenging problem. In contrast to traditional approaches bas...
Percy Liang, Dan Klein, Michael I. Jordan
ICCV
2005
IEEE
14 years 11 months ago
A Supervised Learning Framework for Generic Object Detection in Images
In recent years Kernel Principal Component Analysis (Kernel PCA) has gained much attention because of its ability to capture nonlinear image features, which are particularly impor...
Saad Ali, Mubarak Shah
ACSAC
2008
IEEE
14 years 4 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri