Sciweavers

42388 search results - page 8276 / 8478
» Classification Using Information
Sort
View
CCS
2007
ACM
15 years 9 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
CCS
2007
ACM
15 years 9 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CIKM
2007
Springer
15 years 9 months ago
Top-k subgraph matching query in a large graph
Recently, due to its wide applications, subgraph search has attracted a lot of attention from database and data mining community. Sub-graph search is defined as follows: given a ...
Lei Zou, Lei Chen 0002, Yansheng Lu
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
DILS
2007
Springer
15 years 9 months ago
Fast Approximate Duplicate Detection for 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectroscopy is a powerful analytical method to elucidate the chemical structure of molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra cor...
Björn Egert, Steffen Neumann, Alexander Hinne...
« Prev « First page 8276 / 8478 Last » Next »