Sciweavers

9182 search results - page 1750 / 1837
» Requirements for Requirements Management Tools
Sort
View
CCS
2007
ACM
14 years 4 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
CCS
2007
ACM
14 years 4 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
14 years 4 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
CLEF
2007
Springer
14 years 4 months ago
Cross-Lingual Information Retrieval System for Indian Languages
This paper describes our first participation in the Indian language sub-task of the main Adhoc monolingual and bilingual track in CLEF1 competition. In this track, the task is to...
Jagadeesh Jagarlamudi, A. Kumaran
CONTEXT
2007
Springer
14 years 4 months ago
Discovering Hidden Contextual Factors for Implicit Feedback
Abstract. This paper presents a statistical framework based on Principal Component Analysis (PCA) for discovering the contextual factors which most strongly influence user behavio...
Massimo Melucci, Ryen W. White
« Prev « First page 1750 / 1837 Last » Next »