Sciweavers

2050 search results - page 219 / 410
» constraints 2010
Sort
View
IEEESP
2010
82views more  IEEESP 2010»
13 years 9 months ago
Scenario-Driven Role Engineering
Role engineering for role-based access control (RBAC) is a process to define roles, permissions, constraints, and role hierarchies. The scenario-driven role engineering process pr...
Mark Strembeck
IJCV
2010
135views more  IJCV 2010»
13 years 8 months ago
On the Apparent Transparency of a Motion Blurred Object
An object which moves during the exposure time results in a blurred smear in the image. We consider the smear as if it was the image of a semitransparent object, and we retrieve i...
Vincenzo Caglioti, Alessandro Giusti
IJSNET
2010
103views more  IJSNET 2010»
13 years 8 months ago
Quality-aware sensor data collection
: Many sensor applications often require to collect raw sensed values from many sensor nodes to one centralized server. Sensor data collection typically comes with various quality ...
Qi Han, Doug Hakkarinen, Pruet Boonma, Junichi Suz...
INCDM
2010
Springer
138views Data Mining» more  INCDM 2010»
13 years 8 months ago
Learning Discriminative Distance Functions for Case Retrieval and Decision Support
The importance of learning distance functions is gradually being acknowledged by the machine learning community, and different techniques are suggested that can successfully learn ...
Alexey Tsymbal, Martin Huber, Shaohua Kevin Zhou
INFOCOM
2010
IEEE
13 years 8 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant