Sciweavers

476 search results - page 76 / 96
» General Constrained Deformations based on Generalized Metaba...
Sort
View
87
Voted
POPL
1995
ACM
15 years 3 months ago
Parametric Program Slicing
Program slicing is a technique for isolating computational threads in programs. In this paper, we show how to mechanically extract a family of practical algorithms for computing s...
John Field, G. Ramalingam, Frank Tip
ICPR
2010
IEEE
15 years 1 months ago
Fusion of Qualities for Frame Selection in Video Face Verification
It is known that the use of video can help improve the performance of face verification systems. However, processing video in resource constrained devices is prohibitive. In order ...
Mauricio Villegas, Roberto Paredes
CCS
2008
ACM
15 years 1 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 1 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
SDM
2008
SIAM
140views Data Mining» more  SDM 2008»
15 years 1 months ago
Large-Scale Many-Class Learning
In many multiclass learning scenarios, the number of classes is relatively large (thousands,...), or the space and time efficiency of the learning system can be crucial. We invest...
Omid Madani, Michael Connor