Sciweavers

CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 2 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
CORR
2011
Springer
148views Education» more  CORR 2011»
13 years 2 months ago
Universal Learning Theory
Marcus Hutter
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 2 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 2 months ago
A Comparison of Two Human Brain Tumor Segmentation Methods for MRI Data
Jan Egger, Dzenan Zukic, Miriam Helen Anna Bauer, ...
CORR
2011
Springer
157views Education» more  CORR 2011»
13 years 2 months ago
Convergence of type-symmetric and cut-balanced consensus seeking systems
We consider continuous-time consensus seeking systems whose time-dependent interactions are cut-balanced, in the following sense: if a group of agents influences the remaining on...
Julien M. Hendrickx, John N. Tsitsiklis
CORR
2011
Springer
148views Education» more  CORR 2011»
13 years 2 months ago
Modeling the pairwise key distribution scheme in the presence of unreliable links
Abstract— We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out u...
Osman Yagan, Armand M. Makowski
CORR
2011
Springer
245views Education» more  CORR 2011»
13 years 2 months ago
Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks
Spectrum management has been identified as a crucial step towards enabling the technology of the cognitive radio network (CRN). Most of the current works dealing with spectrum ma...
Mingyi Hong, Alfredo Garcia, Jorge Alviar
CORR
2011
Springer
212views Education» more  CORR 2011»
13 years 2 months ago
Analytical Study of Object Components for Distributed and Ubiquitous Computing Environment
: - The Distributed object computing is a paradigm that allows objects to be distributed across a heterogeneous network, and allows each of the components to interoperate as a unif...
Usha Batra, Deepak Dahiya, Sachin Bhardwaj
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 2 months ago
On Paraconsistent Weakening of Intuitionistic Negation
In [1], systems of weakening of intuitionistic negation logic called Zn and CZn were developed in the spirit of da Costa’s approach(c.f. [2]) by preserving, differently from da C...
Zoran Majkic
CORR
2011
Springer
199views Education» more  CORR 2011»
13 years 2 months ago
From Machine Learning to Machine Reasoning
A plausible definition of "reasoning" could be "algebraically manipulating previously acquired knowledge in order to answer a new question". This definition co...
Léon Bottou