Sciweavers

1181 search results - page 97 / 237
» constraints 2004
Sort
View
ICML
2004
IEEE
14 years 2 months ago
Active learning of label ranking functions
The effort necessary to construct labeled sets of examples in a supervised learning scenario is often disregarded, though in many applications, it is a time-consuming and expensi...
Klaus Brinker
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
ADS
2004
Springer
14 years 2 months ago
Modifications of Speech Articulatory Characteristics in the Emotive Speech
The aim of the research is the phonetic articulatory description of emotive speech achievable studying the labial movements, which are the product of the compliance with both the p...
Emanuela Magno Caldognetto, Piero Cosi, Federica C...
AUSAI
2004
Springer
14 years 2 months ago
A Logic Based Approach for Dynamic Access Control
The PolicyUpdater1 system is a fully-implemented access control system that provides policy evaluations as well as dynamic policy updates. These functions are achieved by the use o...
Vino Fernando Crescini, Yan Zhang
CASSIS
2004
Springer
14 years 2 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...