Sciweavers

2011 search results - page 376 / 403
» Universal Reinforcement Learning
Sort
View
115
Voted
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
16 years 2 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
CVPR
2010
IEEE
15 years 11 months ago
Reading Between The Lines: Object Localization Using Implicit Cues from Image Tags
Current uses of tagged images typically exploit only the most explicit information: the link between the nouns named and the objects present somewhere in the image. We propose to ...
Sung Ju Hwang, University of Texas, Kristen Grauma...
126
Voted
ESSOS
2009
Springer
15 years 9 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
182
Voted
ITICSE
2009
ACM
15 years 9 months ago
First experiences with a classroom recording system
This paper describes our experiences with the first partial deployment of Presentations Automatically Organized from Lectures (PAOL), a lecture recording system developed and tes...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
117
Voted
CDC
2008
IEEE
197views Control Systems» more  CDC 2008»
15 years 9 months ago
Dynamic spectrum access policies for cognitive radio
—We study the problem of dynamic spectrum sensing and access in cognitive radio systems as a partially observed Markov decision process (POMDP). A group of cognitive users cooper...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli