Sciweavers

311 search results - page 48 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 8 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
CCS
2006
ACM
15 years 5 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
ATAL
2006
Springer
15 years 5 months ago
Multiply-constrained distributed constraint optimization
Distributed constraint optimization (DCOP) has emerged as a useful technique for multiagent coordination. While previous DCOP work focuses on optimizing a single team objective, i...
Emma Bowring, Milind Tambe, Makoto Yokoo
PR
2007
133views more  PR 2007»
15 years 27 days ago
Incorporating multiple SVMs for automatic image annotation
In this paper, a novel automatic image annotation system is proposed, which integrates two sets of support vector machines (SVMs), namely the multiple instance learning (MIL)-base...
Xiaojun Qi, Yutao Han
ICNC
2009
Springer
15 years 8 months ago
Estimating Strength of Concrete Using a Grammatical Evolution
The main purpose of this paper is to propose an incorporating a grammatical evolution (GE) into the genetic algorithm (GA), called GEGA, and apply it to estimate the compressive s...
Hsun-Hsin Hsu, Li Chen, Chang-Huan Kou, Tai-Sheng ...