Sciweavers

2250 search results - page 18 / 450
» Authorizing applications in singularity
Sort
View
OSDI
2000
ACM
14 years 11 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 9 months ago
A Spectral Algorithm for Learning Hidden Markov Models
Hidden Markov Models (HMMs) are one of the most fundamental and widely used statistical tools for modeling discrete time series. In general, learning HMMs from data is computation...
Daniel Hsu, Sham M. Kakade, Tong Zhang
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 9 months ago
Empirical Evaluation of Four Tensor Decomposition Algorithms
Higher-order tensor decompositions are analogous to the familiar Singular Value Decomposition (SVD), but they transcend the limitations of matrices (second-order tensors). SVD is ...
Peter D. Turney
ICRA
2009
IEEE
116views Robotics» more  ICRA 2009»
14 years 7 months ago
Kinematic analysis and optimal design of a 3T1R type parallel mechanism
In previous studies on 4-DOF parallel mechanisms with four sub-chains, only symmetric arrangement of those four chains connected to the top plate was considered. Such symmetric sha...
Sung Mok Kim, Whee Kuk Kim, Byung-Ju Yi
ACSAC
2001
IEEE
15 years 1 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth