Sciweavers

8177 search results - page 524 / 1636
» Detecting System Emulators
Sort
View
125
Voted
ICASSP
2009
IEEE
15 years 8 months ago
Detection of sparse signals under finite-alphabet constraints
In this paper, we solve the problem of detecting the entries of a sparse finite-alphabet signal from a limited amount of data, for instance obtained by compressive sampling. While...
Zhi Tian, Geert Leus, Vincenzo Lottici
133
Voted
DEXA
2006
Springer
151views Database» more  DEXA 2006»
15 years 8 months ago
Personalized Detection of Fresh Content and Temporal Annotation for Improved Page Revisiting
Abstract. Page revisiting is a popular browsing activity in the Web. In this paper we describe a method for improving page revisiting by detecting and highlighting the information ...
Adam Jatowt, Yukiko Kawai, Katsumi Tanaka
ACSAC
2001
IEEE
15 years 8 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
175
Voted
CIKM
2008
Springer
15 years 7 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
136
Voted
DAGSTUHL
2007
15 years 6 months ago
Decision Procedures for Loop Detection
Abstract. The dependency pair technique is a powerful modular method for automated termination proofs of term rewrite systems. We first show that dependency pairs are also suitabl...
René Thiemann, Jürgen Giesl, Peter Sch...