Sciweavers

2265 search results - page 331 / 453
» Recovering Exchanged Data
Sort
View
ESOP
2010
Springer
14 years 8 days ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
AAAI
2008
13 years 11 months ago
Maximum Entropy Inverse Reinforcement Learning
Recent research has shown the benefit of framing problems of imitation learning as solutions to Markov Decision Problems. This approach reduces learning to the problem of recoveri...
Brian Ziebart, Andrew L. Maas, J. Andrew Bagnell, ...
USENIX
2007
13 years 11 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
CVPR
2008
IEEE
13 years 10 months ago
Recovery of relative depth from a single observation using an uncalibrated (real-aperture) camera
In this paper we investigate the challenging problem of recovering the depth layers in a scene from a single defocused observation. The problem is definitely solvable if there are...
Vinay P. Namboodiri, Subhasis Chaudhuri
CASCON
2007
157views Education» more  CASCON 2007»
13 years 10 months ago
Threats on building models from CVS and Bugzilla repositories: the Mozilla case study
Information obtained by merging data extracted from problem reporting systems – such as Bugzilla – and versioning systems – such as Concurrent Version System (CVS) – is wi...
Kamel Ayari, Peyman Meshkinfam, Giuliano Antoniol,...