Sciweavers

316 search results - page 18 / 64
» Where do security policies come from
Sort
View
HPCA
2000
IEEE
14 years 1 days ago
Modified LRU Policies for Improving Second-Level Cache Behavior
Main memory accesses continue to be a significant bottleneck for applications whose working sets do not fit in second-level caches. With the trend of greater associativity in seco...
Wayne A. Wong, Jean-Loup Baer
CCS
2007
ACM
14 years 1 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
AAAI
2006
13 years 9 months ago
Phoebus: A System for Extracting and Integrating Data from Unstructured and Ungrammatical Sources
With the proliferation of online classifieds and auctions comes a new need to meaningfully search and organize the items for sale. However, since the seller's item descriptio...
Matthew Michelson, Craig A. Knoblock
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 7 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
ICML
1997
IEEE
14 years 8 months ago
Robot Learning From Demonstration
The goal of robot learning from demonstration is to have a robot learn from watching a demonstration of the task to be performed. In our approach to learning from demonstration th...
Christopher G. Atkeson, Stefan Schaal