Sciweavers

2412 search results - page 348 / 483
» Which Problems Have Strongly Exponential Complexity
Sort
View
COMPSAC
2007
IEEE
14 years 1 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 9 months ago
On combinations of local theory extensions
Many problems in mathematics and computer science can be reduced to proving the satisfiability of conjunctions of literals in a background theory which is often the extension of a ...
Viorica Sofronie-Stokkermans
CRV
2008
IEEE
205views Robotics» more  CRV 2008»
14 years 3 months ago
Accurate Boundary Localization using Dynamic Programming on Snakes
The extraction of contours using deformable models, such as snakes, is a problem of great interest in computer vision, particular in areas of medical imaging and tracking. Snakes ...
Akshaya Kumar Mishra, Paul W. Fieguth, David A. Cl...
ICDM
2005
IEEE
148views Data Mining» more  ICDM 2005»
14 years 2 months ago
Hot Item Mining and Summarization from Multiple Auction Web Sites
Online auction Web sites are fast changing, highly dynamic, and complex as they involve tremendous sellers and potential buyers, as well as a huge amount of items listed for biddi...
Tak-Lam Wong, Wai Lam
CAISE
1999
Springer
14 years 1 months ago
A Practical Approach to Access Heterogeneous and Distributed Databases
A common problem within most large corporations nowadays is the diversity of database systems that are employed by their many departments in the development of a product. Usually, ...
Fernando de Ferreira Rezende, Ulrich Hermsen, Geor...