Sciweavers

491 search results - page 98 / 99
» A new kernel-based approach for linear system identification
Sort
View
KDD
2008
ACM
193views Data Mining» more  KDD 2008»
14 years 5 months ago
A family of dissimilarity measures between nodes generalizing both the shortest-path and the commute-time distances
This work introduces a new family of link-based dissimilarity measures between nodes of a weighted directed graph. This measure, called the randomized shortest-path (RSP) dissimil...
Luh Yen, Marco Saerens, Amin Mantrach, Masashi Shi...
SACMAT
2009
ACM
13 years 11 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
CGI
2006
IEEE
13 years 11 months ago
Spline Thin-Shell Simulation of Manifold Surfaces
It has been technically challenging to effectively model and simulate elastic deformation of spline-based, thin-shell objects of complicated topology. This is primarily because tra...
Kexiang Wang, Ying He 0001, Xiaohu Guo, Hong Qin
SIGGRAPH
1998
ACM
13 years 9 months ago
Non-distorted Texture Mapping for Sheared Triangulated Meshes
This article introduces new techniques for non-distorted texture mapping on complex triangulated meshes. Texture coordinates are assigned to the vertices of the triangulation by u...
Bruno Lévy, Jean-Laurent Mallet
CCS
2007
ACM
13 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...