Sciweavers

2250 search results - page 54 / 450
» Authorizing applications in singularity
Sort
View
IMECS
2007
14 years 11 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
CVPR
2008
IEEE
15 years 11 months ago
Tensor reduction error analysis - Applications to video compression and classification
Tensor based dimensionality reduction has recently been extensively studied for computer vision applications. To our knowledge, however, there exist no rigorous error analysis on ...
Chris H. Q. Ding, Heng Huang, Dijun Luo
BMCBI
2010
216views more  BMCBI 2010»
14 years 4 months ago
Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus Challenge Studies
Background: Nonparametric Bayesian techniques have been developed recently to extend the sophistication of factor models, allowing one to infer the number of appropriate factors f...
Bo Chen, Minhua Chen, John William Paisley, Aimee ...
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
15 years 3 months ago
Differential and geometric properties of Rayleigh quotients with applications
the following cost functions: In this paper, learning rules are proposed for simultaneous corn- GI(U) = tr{(UTU)(UTBU)-lD, (la) putation of minor eigenvectors of a covariance matri...
M. A. Hasan
ICDCS
2003
IEEE
15 years 3 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...