Sciweavers

10412 search results - page 2023 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
123
Voted
CSFW
2004
IEEE
15 years 6 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
129
Voted
CC
2006
Springer
122views System Software» more  CC 2006»
15 years 6 months ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren
133
Voted
CCS
2006
ACM
15 years 6 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
157
Voted
CIKM
2006
Springer
15 years 6 months ago
Summarizing local context to personalize global web search
The PC Desktop is a very rich repository of personal information, efficiently capturing user's interests. In this paper we propose a new approach towards an automatic persona...
Paul-Alexandru Chirita, Claudiu S. Firan, Wolfgang...
125
Voted
FGR
2004
IEEE
132views Biometrics» more  FGR 2004»
15 years 6 months ago
Expand Training Set for Face Detection by GA Re-sampling
Data collection for both training and testing a classifier is a tedious but essential step towards face detection and recognition. All of the statistical methods suffer from this ...
Jie Chen, Xilin Chen, Wen Gao
« Prev « First page 2023 / 2083 Last » Next »