Sciweavers

661 search results - page 49 / 133
» Combining Information using Hard Constraints
Sort
View
103
Voted
CCS
2005
ACM
15 years 6 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
119
Voted
CJ
2010
150views more  CJ 2010»
14 years 10 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
108
Voted
SIGIR
2008
ACM
15 years 13 days ago
Learning from labeled features using generalized expectation criteria
It is difficult to apply machine learning to new domains because often we lack labeled problem instances. In this paper, we provide a solution to this problem that leverages domai...
Gregory Druck, Gideon S. Mann, Andrew McCallum
94
Voted
ICVGIP
2004
15 years 1 months ago
Local Correlation-based Fingerprint Matching
Most fingerprint matching systems are based on matching minutia points between two fingerprint images. Each minutia is represented by a fixed number of attributes such as the loca...
Karthik Nandakumar, Anil K. Jain
95
Voted
TWC
2008
116views more  TWC 2008»
15 years 12 days ago
The performance of multi-user cooperative diversity in an asynchronous CDMA uplink
Abstract--This paper investigates the impact of interuser non-orthogonality and asynchronous communication on the information-outage probability performance of multi-user decode-an...
Kanchan G. Vardhe, Daryl Reynolds, Matthew C. Vale...