Sciweavers

303 search results - page 29 / 61
» Unifying Theories of Confidentiality
Sort
View
ENTCS
2007
105views more  ENTCS 2007»
13 years 9 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
ICIP
2005
IEEE
14 years 11 months ago
Bayesian face detection in an image sequence using face probability gradient ascent
Face detection in an image sequence is a challenging problem for many applications. In this paper, a novel face detection method is proposed. In order to detect faces in a sequenc...
Jae Hee Park, Hae-Chul Choi, Seong-Dae Kim
RECOMB
2001
Springer
14 years 10 months ago
Applications of generalized pair hidden Markov models to alignment and gene finding problems
Hidden Markov models (HMMs) have been successfully applied to a variety of problems in molecular biology, ranging from alignment problems to gene nding and annotation. Alignment p...
Lior Pachter, Marina Alexandersson, Simon Cawley
HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
14 years 4 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
TARK
2007
Springer
14 years 4 months ago
Explaining quantity implicatures
We give derivations of two formal models of Gricean Quantity1 implicature and strong exhaustivity (Van Rooij and Schulz, 2004; Schulz and Van Rooij, 2006), in bidirectional optima...
Tikitu de Jager, Robert van Rooij