Sciweavers

2011 search results - page 376 / 403
» Universal Reinforcement Learning
Sort
View
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 8 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
CVPR
2010
IEEE
14 years 4 months ago
Reading Between The Lines: Object Localization Using Implicit Cues from Image Tags
Current uses of tagged images typically exploit only the most explicit information: the link between the nouns named and the objects present somewhere in the image. We propose to ...
Sung Ju Hwang, University of Texas, Kristen Grauma...
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
ITICSE
2009
ACM
14 years 2 months ago
First experiences with a classroom recording system
This paper describes our experiences with the first partial deployment of Presentations Automatically Organized from Lectures (PAOL), a lecture recording system developed and tes...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
CDC
2008
IEEE
197views Control Systems» more  CDC 2008»
14 years 2 months ago
Dynamic spectrum access policies for cognitive radio
—We study the problem of dynamic spectrum sensing and access in cognitive radio systems as a partially observed Markov decision process (POMDP). A group of cognitive users cooper...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli