Sciweavers

1937 search results - page 311 / 388
» Rule Based Updates on Simple Knowledge Bases
Sort
View
130
Voted
WISA
2004
Springer
15 years 9 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
146
Voted
PLDI
2009
ACM
15 years 8 months ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands
147
Voted
GI
2009
Springer
15 years 8 months ago
Area Preserving Parameterisation of Shapes with Spherical Topology
: Statistical shape models are powerful tools for model-based segmentation and have been sucessfully applied to the segmentation of various structures in medical images. Though the...
Matthias Kirschner, Stefan Wesarg
128
Voted
PPSN
1998
Springer
15 years 8 months ago
Inver-over Operator for the TSP
Abstract. In this paper we investigate the usefulness of a new operator, inver-over, for an evolutionary algorithm for the TSP. Inver-over is based on simple inversion, however, kn...
Guo Tao, Zbigniew Michalewicz
114
Voted
LREC
2008
97views Education» more  LREC 2008»
15 years 5 months ago
Clustering of Terms from Translation Dictionaries and Synonyms Lists to Automatically Build more Structured Linguistic Resources
Building a Linguistic Resource (LR) is a task requiring a huge quantitative of means, human resources and funds. Though finalization of the development phase and assessment of the...
Maria Teresa Pazienza, Armando Stellato