Sciweavers

8655 search results - page 473 / 1731
» Challenges for Trusted Computing
Sort
View
152
Voted
GI
2009
Springer
15 years 7 months ago
Improving Usability of Integrated Emergency Response Systems: The SoKNOS Approach
: Implementing systems for emergency response poses various challenges. Information from various sources and systems needs to be integrated, processed, aggregated, and visualized i...
Heiko Paulheim, Sebastian Döweling, Karen H. ...
ICPR
2010
IEEE
15 years 6 months ago
Consensus Network Based Hypotheses Combination for Arabic Offline Handwriting Recognition
Offline handwriting recognition (OHR) is an extremely challenging task because of many factors including variations in writing style, writing device and material, and noise in the ...
Rohit Prasad, Matin Kamali, David Belanger, Antti-...
DIMVA
2010
15 years 6 months ago
Organizing Large Scale Hacking Competitions
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security co...
Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, L...
SACMAT
2010
ACM
15 years 3 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
JMLR
2012
13 years 7 months ago
Structured Output Learning with High Order Loss Functions
Often when modeling structured domains, it is desirable to leverage information that is not naturally expressed as simply a label. Examples include knowledge about the evaluation ...
Daniel Tarlow, Richard S. Zemel