Sciweavers

6960 search results - page 979 / 1392
» Continuity Analysis of Programs
Sort
View
JCDL
2005
ACM
136views Education» more  JCDL 2005»
15 years 10 months ago
Digital libraries' support for the user's 'information journey'
The temporal elements of users’ information requirements are a continually confounding aspect of digital library design. No sooner have users’ needs been identified and suppor...
Anne Adams, Ann Blandford
SACMAT
2005
ACM
15 years 10 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
123
Voted
STORAGESS
2005
ACM
15 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
DAGM
2005
Springer
15 years 10 months ago
Regularization on Discrete Spaces
Abstract. We consider the classification problem on a finite set of objects. Some of them are labeled, and the task is to predict the labels of the remaining unlabeled ones. Such...
Dengyong Zhou, Bernhard Schölkopf
126
Voted
IPMI
2005
Springer
15 years 10 months ago
Elastic Shape Models for Interpolations of Curves in Image Sequences
Many applications in image analysis are concerned with the temporal evolution of shapes in video sequences. In situations involving low-contrast, low-quality images, human aid is o...
Shantanu H. Joshi, Anuj Srivastava, Washington Mio