Sciweavers

4762 search results - page 674 / 953
» About the use of protein models
Sort
View
141
Voted
IAT
2010
IEEE
14 years 11 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
ICMLC
2010
Springer
14 years 11 months ago
An improvement of translation quality with adding key-words in parallel corpus
: In this paper, we propose a new approach to improve the translation quality by adding the Key-Words of a sentence to the parallel corpus. The main idea of the approach is to find...
Liang Tian, Fai Wong, Sam Chao
UTP
2010
14 years 11 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
14 years 11 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
EMNLP
2009
14 years 11 months ago
Active Learning by Labeling Features
Methods that learn from prior information about input features such as generalized expectation (GE) have been used to train accurate models with very little effort. In this paper,...
Gregory Druck, Burr Settles, Andrew McCallum