Sciweavers

450 search results - page 61 / 90
» Mathematical Formulas Extraction
Sort
View
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
TMC
2012
12 years 11 days ago
Relay-Assisted Transmission with Fairness Constraint for Cellular Networks
Abstract—We consider the problem of relay-assisted transmission for cellular networks. In the considered system, a source node together with n relay nodes are selected in a propo...
Erwu Liu, Qinqing Zhang, Kin K. Leung
ICIP
2002
IEEE
14 years 11 months ago
Fast and effective characterization of 3D region data
We consider the problem of characterization of spatial region data such as the regions of interest (ROIs) in medical images. We propose a method that efficiently extracts a k-dime...
Vasileios Megalooikonomou, Haimonti Dutta, Despina...
WWW
2009
ACM
14 years 10 months ago
Query clustering using click-through graph
In this paper we describe a problem of discovering query clusters from a click-through graph of web search logs. The graph consists of a set of web search queries, a set of pages ...
Jeonghee Yi, Farzin Maghoul
CCS
2010
ACM
14 years 4 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu