Sciweavers

2006 search results - page 71 / 402
» Heuristic Security-Testing Methods
Sort
View
84
Voted
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 7 days ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
109
Voted
MP
1998
117views more  MP 1998»
15 years 7 days ago
The node capacitated graph partitioning problem: A computational study
In this paper we consider the problem of ^-partitioning the nodes of a graph with capacity restrictions on the sum of the node weights in each subset of the partition, and the obje...
Carlos Eduardo Ferreira, Alexander Martin, C. Carv...
ICML
2005
IEEE
16 years 1 months ago
Learning as search optimization: approximate large margin methods for structured prediction
Mappings to structured output spaces (strings, trees, partitions, etc.) are typically learned using extensions of classification algorithms to simple graphical structures (eg., li...
Daniel Marcu, Hal Daumé III
89
Voted
IRI
2006
IEEE
15 years 6 months ago
A new heuristic-based albeit complete method to extract MUCs from unsatisfiable CSPs
When a Constraint Satisfaction Problem (CSP) admits no solution, most current solvers express that the whole search space has been explored unsuccessfully but do not exhibit which...
Éric Grégoire, Bertrand Mazure, C&ea...
CAIP
2005
Springer
102views Image Analysis» more  CAIP 2005»
15 years 6 months ago
Improvement of a Person Labelling Method Using Extracted Knowledge on Costume
This paper presents a novel approach for automatic person labelling in video sequences using costumes. The person recognition is carried out by extracting the costumes of all the p...
Gaël Jaffré, Philippe Joly